<--- Back to Details
First PageDocument Content
Internet / Firewall / Router / IP traceback / Denial-of-service attack / IP address spoofing / Ingress filtering / Computer network security / Computing / Network architecture
Date: 2008-10-23 12:44:56
Internet
Firewall
Router
IP traceback
Denial-of-service attack
IP address spoofing
Ingress filtering
Computer network security
Computing
Network architecture

Pretty Good Packet Authentication Andreas Haeberlen†‡ † Rodrigo Rodrigues†

Add to Reading List

Source URL: www.mpi-sws.org

Download Document from Source Website

File Size: 137,57 KB

Share Document on Facebook

Similar Documents

Computing / Routing protocols / Data transmission / Network architecture / Internet architecture / Internet Standards / Internet protocols / Routing algorithms / Constraint / Open Shortest Path First / Link-state routing protocol / Router

1 Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

DocID: 1xVAh - View Document

Computing / Routing protocols / Data transmission / Network architecture / Internet architecture / Internet Standards / Internet protocols / Routing algorithms / Constraint / Open Shortest Path First / Link-state routing protocol / Router

1 Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

DocID: 1xUCT - View Document

Computing / Internet architecture / Network architecture / Information and communications technology / Routing / Internet Standards / Computer networking / Border Gateway Protocol / Router / Control plane / IP routing / NetFlow

Leveraging Router Programmability for Traffic Matrix Computation ⇤ Giacomo Balestra‡

DocID: 1xUmh - View Document

PDF Document

DocID: 1wULk - View Document

PDF Document

DocID: 1wgdG - View Document