First Page | Document Content | |
---|---|---|
Date: 2011-11-01 05:09:41Routing protocols Internet Standards Internet protocols Border Gateway Protocol Routing Router IP hijacking Resource Public Key Infrastructure | BGP Policy violations in the data-plane Pierre Francois, Institute IMDEA Networks Paolo Lucente, PMACCTAdd to Reading ListSource URL: www.pmacct.netDownload Document from Source WebsiteFile Size: 161,60 KBShare Document on Facebook |
RESOURCE PUBLIC KEY INFRASTRUCTURE (RPKI) Why USE RPKI?DocID: 1u0Mj - View Document | |
Inter-‐domain rou.ng security Stocktaking, state-‐of-‐the art, and future perspec.ves IEPG, IETF 78, Maastricht, The NetherlandsDocID: 1qQme - View Document | |
Inter-‐domain rou.ng security Stocktaking, state-‐of-‐the art, and future perspec.ves IEPG, IETF 78, Maastricht, The NetherlandsDocID: 1pL0g - View Document | |
ARIN Update Aaron Hughes ARIN Board of Trustees 2014 Focus • IPv4 Depletion & IPv6 AdoptionDocID: 1pHZm - View Document | |
Internet Rou*ng Security: What’s Next? Benno Overeinder NLnet Labs http://www.nlnetlabs.nl/DocID: 1pyAs - View Document |