Resource Public Key Infrastructure

Results: 58



#Item
21Routing protocols / Routing / Internet protocols / Internet standards / Border Gateway Protocol / Resource Public Key Infrastructure / IP hijacking / Router / Network architecture / Internet / Computing

Microsoft PowerPoint - CSRIC III - Working Groupppt [Compatibility Mode]

Add to Reading List

Source URL: research.dyn.com

Language: English - Date: 2014-07-27 13:25:57
22Routing protocols / Routing / Internet protocols / Internet standards / Border Gateway Protocol / IP hijacking / Resource Public Key Infrastructure / Router / Multihoming / Network architecture / Internet / Computing

Microsoft Word - CSRIC III WG6 Final Reportdocx

Add to Reading List

Source URL: research.dyn.com

Language: English - Date: 2014-07-27 13:26:36
23Application software / Key management / Public key infrastructure / Public-key cryptography

#1  ELECTRONIC RESOURCE  2003  Conceptual framework approach for system­of­systems software developments / Dale  Scott Caffall  Caffall, Dale Scott. 

Add to Reading List

Source URL: www.nps.edu

Language: English - Date: 2013-06-21 18:22:03
24Routing protocols / Routing / Internet protocols / Internet standards / Border Gateway Protocol / Resource Public Key Infrastructure / IP hijacking / Router / Network architecture / Internet / Computing

Microsoft PowerPoint - CSRIC III - Working Groupppt [Compatibility Mode]

Add to Reading List

Source URL: research.dyn.com

Language: English - Date: 2014-09-23 10:34:41
25Routing protocols / Routing / Border Gateway Protocol / Resource Public Key Infrastructure / Email spam / Router / Anycast / Spam / Multihoming / Internet / Network architecture / Computing

SPAMTRACER:   HOW  STEALTHY  ARE  SPAMMERS?   TRAFFIC  MONITORING  AND  ANALYSIS  (TMA)  2013   PIERRE-­‐ANTOINE  VERVIER,  OLIVIER  THONNARD    

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-29 06:33:08
26Public key infrastructure / X.509 / Web of trust / Public key certificate / Certificate authority / Authorization certificate / PERMIS / Revocation list / PKI Resource Query Protocol / Cryptography / Public-key cryptography / Key management

1st Annual PKI Research Workshop---Proceedings Improvements on Conventional PKI Wisdom Carl Ellison

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2002-08-03 22:47:04
27Regional Internet Registries / Routing protocols / Internet protocols / Internet standards / Public-key cryptography / NLnet / Border Gateway Protocol / Resource Public Key Infrastructure / Asia-Pacific Network Information Centre / Internet / Network architecture / Computing

Internet  Rou*ng  Security:   What’s  Next?   Benno  Overeinder   NLnet  Labs   http://www.nlnetlabs.nl/

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2011-01-18 09:16:13
28Computing / Internet standards / Routing / Internet protocols / Border Gateway Protocol / Resource Public Key Infrastructure / Autonomous system / IP hijacking / BGP confederation / Network architecture / Internet / Routing protocols

Effects of RPKI Deployment on BGP Security Alexandru Ștefănescu

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:39:47
29Routing protocols / Internet protocols / Internet standards / Public-key cryptography / Resource Public Key Infrastructure / SQL / Objective-C / Whois / Asia-Pacific Network Information Centre / Computing / Internet / Software engineering

Improving Route Object processes in WHOIS George Michaelson, APNIC R&D Route Object Template route:

Add to Reading List

Source URL: conference.apnic.net

Language: English - Date: 2013-02-25 23:29:32
30Routing protocols / Internet protocols / Routing / Internet standards / Border Gateway Protocol / Resource Public Key Infrastructure / Router / IP address / IPv6 / Network architecture / Internet / Computing

BGP—Origin AS Validation The BGP—Origin AS Validation feature helps prevent network administrators from inadvertently advertising routes to networks they do not control. This feature uses a Resource Public Key Infras

Add to Reading List

Source URL: www.cisco.com

Language: English
UPDATE