Routing protocol

Results: 2050



#Item
351Cryptography / Public-key cryptography / Routing / Network architecture / Digital signature / Records management technology / Signature / IP routing / PKD / Internet protocol suite / Communications protocol

Mechanized Network Origin and Path Authenticity Proofs Fuyuan Zhang Limin Jia CyLab, CMU

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
352Computing / Network architecture / Internet / Internet Standards / Routing protocols / Internet protocols / Routing / Computer networking / Border Gateway Protocol / Router / Forwarding plane / Control plane

Peer Pressure: Exerting Malicious Influence on Routers at a Distance Max Schuchard1 , Christopher Thompson2 , Nicholas Hopper1 , and Yongdae Kim3 1 Department of Computer Science and Engineering, University of Minnesota

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-07-08 10:49:22
353Computing / Internet / Network architecture / Internet protocols / Secure communication / Dark web / Internet security / Tor / Onion routing / Traffic analysis / Proxy server / Transmission Control Protocol

Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:49:00
354

IEEE SENSORS JOURNAL, VOL. 14, NO. 7, JULYScalable Dynamic Routing Protocol for Cognitive Radio Sensor Networks

Add to Reading List

Source URL: www.comm.utoronto.ca

Language: English
    355Routing algorithms / Wireless networking / Routing / Optimized Link State Routing Protocol / Link-state routing protocol / Flooding / Wireless ad hoc network / Source routing / Packet switching / Packet forwarding / Zone Routing Protocol / Dynamic Source Routing

    1 Vampire attacks: Draining life from wireless ad-hoc sensor networks Eugene Y. Vasserman∗ Kansas State University

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2012-04-20 11:50:45
    356Cryptography / Onion routing / Chosen-ciphertext attack / Public-key cryptography / Transmission Control Protocol / Mix network / RSA / Encryption / Mixminion

    PDF Document

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2008-05-30 10:39:07
    357Wireless networking / Computing / Network architecture / Wireless ad hoc network / Routing / Communications protocol / Topology control / Charles Stark Draper / Science and technology

    PDF Document

    Add to Reading List

    Source URL: db.csail.mit.edu

    Language: English - Date: 2005-06-30 21:51:14
    358Routing protocols / Routing / Internet Standards / Internet protocols / Computer networking / Border Gateway Protocol / Route flapping / Router / Route reflector / ZMW attack / Control plane / Autonomous system

    PDF Document

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2010-12-02 17:01:32
    359Routing / Internet Standards / Computer networking / Internet protocols / Border Gateway Protocol / Resource Public Key Infrastructure / Route filtering / Router / Autonomous system

    PDF Document

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2012-08-16 08:16:20
    UPDATE