Back to Results
First PageMeta Content
Computing / Router / Reverse path forwarding / Forwarding information base / Routing table / Denial-of-service attack / Protocol Independent Multicast / Forwarding plane / Network architecture / Routing / Internet


iSAVE: Incrementally Deployable Source Address Validation ∗ Jelena Mirkovi´c, Zhiguo Xu, Jun Li, Matthew Schnaider, Peter Reiher, and Lixia Zhang Abstract Reliable information concerning the reverse path to a particul
Add to Reading List

Document Date: 2002-09-28 19:29:54


Open Document

File Size: 172,17 KB

Share Result on Facebook

Company

3COM / Cisco / /

/

IndustryTerm

Internet scale / iSAVE filtering router / downstream filtering router / informational routers / periphery router / downstream routers / information available at every router / Internet routers / iSAVE infrastructure / incoming table at every filtering router / interested filtering router / particular filtering router / exit router / legacy router / given filtering router / upstream router / exit border router / legacy routers / Internet traffic / iSAVE routers / informational router / F-router / particular informational router / Internet address space / informational iSAVE routers / given router / stub routers / iSAVE router / F-routers / straightforward solution / event-driven protocol / informational iSAVE router / border router / iSAVE protocol / /

Movie

D. 2 / /

Organization

National Science Foundation / /

Person

Jun Li / Matthew Schnaider / Jelena Mirkovi / Zhiguo Xu / Tdrop / Peter Reiher / /

Position

administrator / representative / forward / /

Technology

stub routers / event-driven protocol / border router / Internet routers / interested filtering router / Additionally downstream routers / Packet encryption / downstream filtering router / informational iSAVE router / exit router / iSAVE protocol / routing protocols / particular filtering router / informational iSAVE routers / iSAVE filtering router / authoritative I-router / SAVE routers / filtering routers / alternative protocol / given filtering router / 1.2 Storage Cost I-routers / periphery router / Informational Router Informational routers / upstream router / sending router / iSAVE router / requesting F-router / cryptography / I-router operation I-routers / given router / legacy routers / receiving router / SAVE router / exit border router / informational router / appropriate I-router / iSAVE routers / participating routers / 4 authoritative I-router / IPv4 / simulation / given F-router / SAVE protocol / downstream F-routers / digital signature / downstream SAVE routers / 6 F-router / particular informational router / specific router / filtering router / legacy router / compromised router / /

SocialTag