<--- Back to Details
First PageDocument Content
Routing protocols / Hashing / Error detection and correction / Routing algorithms / Distributed data storage / Hash chain / Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Merkle tree / Cryptographic hash function / Distance-vector routing protocol
Date: 2015-06-01 09:06:12
Routing protocols
Hashing
Error detection and correction
Routing algorithms
Distributed data storage
Hash chain
Routing
Link-state routing protocol
Destination-Sequenced Distance Vector routing
Merkle tree
Cryptographic hash function
Distance-vector routing protocol

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Download Document from Source Website

File Size: 236,31 KB

Share Document on Facebook

Similar Documents

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University   Adrian Perrig

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

DocID: 1phYN - View Document

SPV: Secure Path Vector Routing for Securing BGP  ∗ Yih-Chun Hu Adrian Perrig

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

DocID: 1oDfz - View Document

Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers Dept of Mathematics & Computer Science TU Eindhoven, The Netherlands

Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers Dept of Mathematics & Computer Science TU Eindhoven, The Netherlands

DocID: 1mkCs - View Document

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass  Department of Computer Science

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer Science

DocID: 18LEA - View Document

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1  2

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

DocID: 180eG - View Document