Back to Results
First PageMeta Content
Computing / Internet protocols / Internet standards / Cryptographic protocols / Routing protocols / Border Gateway Protocol / Online Certificate Status Protocol / X.509 / Revocation list / Cryptography / Internet / Public-key cryptography


Evaluating the Performance Impact of PKI on BGP Security Meiyuan Zhao∗and Sean W. Smith Department of Computer Science Dartmouth College David M. Nicol Department of Electrical and Computer Engineering
Add to Reading List

Document Date: 2005-02-23 11:08:07


Open Document

File Size: 171,08 KB

Share Result on Facebook

Company

AT&T / GTE / ICANN / /

/

Event

FDA Phase / Product Recall / Product Issues / /

Facility

Computer Engineering University of Illinois / /

IndustryTerm

Internet Registries / public key infrastructure / appropriate repositories routers / security solution / authe processing latencies / Internet measurements / Internet functionality / Internet work / clear best solution / verification processing / path authentication router / autonomous systems / large information-distribution systems / /

Organization

Org / U.S. Securities and Exchange Commission / Dartmouth College / University of Illinois / Department of Electrical / BGP Security Meiyuan Zhao∗and Sean W. Smith Department / /

Person

David M. Nicol / /

/

Position

rebooting BGP speaker / operating BGP speaker / Path Authentication Performance speaker / speaker / routes speaker / Certificate Arbitrator / Colonel / BGP speaker / contact author / origin BGP speaker / /

Product

CRLs / ASes / route / BGP / /

ProvinceOrState

Illinois / California / /

Technology

public key cryptogThe Border Gateway Protocol / router executing BGP protocol / RAM / public key infrastructure / PKI / private key / BGP routers / MTU / SSL / appropriate repositories routers / cryptography / routing protocol / path authentication router / public key / SAS algorithms / LDAP protocol / ISP / caching / IPv4 / simulation / DSP / edge router / simulated BGP protocol / /

SocialTag