<--- Back to Details
First PageDocument Content
Routing protocols / Hashing / Error detection and correction / Routing algorithms / Distributed data storage / Hash chain / Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Merkle tree / Cryptographic hash function / Distance-vector routing protocol
Date: 2015-06-01 09:06:12
Routing protocols
Hashing
Error detection and correction
Routing algorithms
Distributed data storage
Hash chain
Routing
Link-state routing protocol
Destination-Sequenced Distance Vector routing
Merkle tree
Cryptographic hash function
Distance-vector routing protocol

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Download Document from Source Website

File Size: 236,31 KB

Share Document on Facebook

Similar Documents

DATASHEET| 1 DATASHEET HEDVIG DISTRIBUTED STORAGE PLATFORM Hedvig’s software-defined storage solution provides the flexibility needed for rapidly changing data, application, and user requirements in private, hybrid, an

DATASHEET| 1 DATASHEET HEDVIG DISTRIBUTED STORAGE PLATFORM Hedvig’s software-defined storage solution provides the flexibility needed for rapidly changing data, application, and user requirements in private, hybrid, an

DocID: 1uRqj - View Document

BuildingDepot: An Extensible and Distributed Architecture for Building Data Storage, Access and Sharing Yuvraj Agarwal, Rajesh Gupta, Daisuke Komaki, Thomas Weng Department of Computer Science and Engineering, UCSD  {yuv

BuildingDepot: An Extensible and Distributed Architecture for Building Data Storage, Access and Sharing Yuvraj Agarwal, Rajesh Gupta, Daisuke Komaki, Thomas Weng Department of Computer Science and Engineering, UCSD {yuv

DocID: 1uuFR - View Document

Ceph Software Defined Storage Appliance Unified distributed data storage cluster with self-healing, auto-balancing and no single point of failure Lowest power consumption in the industry: 70% power saving Infinite Scale

Ceph Software Defined Storage Appliance Unified distributed data storage cluster with self-healing, auto-balancing and no single point of failure Lowest power consumption in the industry: 70% power saving Infinite Scale

DocID: 1utGb - View Document

DATABASE MANAGEMENT SYSTEMS SOLUTIONS MANUAL THIRD EDITION  Raghu Ramakrishnan

DATABASE MANAGEMENT SYSTEMS SOLUTIONS MANUAL THIRD EDITION Raghu Ramakrishnan

DocID: 1rsHj - View Document

Exercise 4: Extreme Democracy Task 1: Everyone Gets exactly one Vote. . . The goal of this exercise is to prove correct the asynchronous safe broadcast algorithm by Bracha. It tolerates f < n/3 Byzantine faults, so we wi

Exercise 4: Extreme Democracy Task 1: Everyone Gets exactly one Vote. . . The goal of this exercise is to prove correct the asynchronous safe broadcast algorithm by Bracha. It tolerates f < n/3 Byzantine faults, so we wi

DocID: 1rrE3 - View Document