Back to Results
First PageMeta Content
Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Distance-vector routing protocol / Hash chain / Cryptographic hash function / Path vector protocol / Enhanced Interior Gateway Routing Protocol / Interior gateway protocol / Routing protocols / Network architecture / Computing


Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig
Add to Reading List

Document Date: 2003-02-20 14:25:57


Open Document

File Size: 318,86 KB

Share Result on Facebook

Company

Schlumberger / Ford / /

/

Event

Company Expansion / /

Facility

Carnegie Mellon University / Rice University / /

IndustryTerm

hash chain / secure on-demand ad hoc network routing protocol / distance vector routing protocol / neighbor router / neighbor routers / secure protocols / malicious routers / router processing time / Internet backbone router / distance vector protocols / secure Internet / public-key infrastructure / vector routing protocol / secure hardware / secure path vector routing protocols / public services / secure multihop wireless ad hoc network / ad hoc network / agreement protocol / wireless networks / secure network routing protocols / static wireless network / ad hoc networks / malicious router / large Internet routers / time-based authentication protocol / secure routing protocol / hash tree chain / path vector protocols / Internet routing / secure routing protocols / indicated neighbor router / distance vector routing protocols / multihop wireless ad hoc network / static network / larger networks / path vector routing protocols / secure network / /

Organization

National Science Foundation / U.S. Government / Rice University / Carnegie Mellon University / National Aeronautics and Space Administration / Certificate Authority / /

Person

N. Figure / B. Conversely / Adrian Perrig Carnegie / David B. Johnson / Chun Hu Carnegie / /

Position

single head / /

Technology

neighbor router / time-based authentication protocol / Introduction Routing protocols / secure network routing protocols / securing distance vector protocols / secure path vector routing protocols / SEAD protocol / indicated neighbor router / attacking router / neighbor routers / key agreement protocol / one router / distance vector routing protocols / 4 routers / public-key infrastructure / Ariadne routing protocol / cryptography / distance vector routing protocol / malicious router / routing protocol / Internet backbone router / large Internet routers / secure on-demand ad hoc network routing protocol / secure routing protocol / secure routing protocols / Ad hoc Distance vector routing protocol / simulation / distance vector protocols / path vector routing protocols / securing path vector protocols / /

SocialTag