共 23 条
- [1] Li Q., Wu J.-P., Xu M.-W., Xu K., Zhang X.-W., GesBGP: A good-enough-security BGP, Chinese Journal of Computers, 32, 3, pp. 506-515, (2009)
- [2] Kent S., Lynn C., Seo K., Secure border gateway protocol, IEEE Journal on Selected Areas in Communications, 18, 4, pp. 582-592, (2000)
- [3] White R., Securing BGP through secure origin BGP, The Internet Protocol Journal, 6, 3, pp. 15-22, (2003)
- [4] Siganos G., Faloutsos M., Analyzing BGP policies: Methodology and tool, Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2004), pp. 1640-1651, (2004)
- [5] Goodell G., Aiello W., Griffin T., Working around BGP: An incremental approach to improving security and accuracy of interdomain routing, Proceedings of the ISOC NDSS 2003, pp. 75-85, (2003)
- [6] Pei D., Lad M., Massey D., Zhang L., Route diagnosis in path vector protocols, (2004)
- [7] Lad M., Massey D., Pei D., Wu Y., Zhang B., Zhang L.X., PHAS: A prefix hijack alert system, Proceedings of the 15th USENIX Security Symposium (Security 2006), pp. 153-166, (2006)
- [8] The RIPE NCC MyASN service, (2008)
- [9] Hu N., Zou P., Zhu P.-D., Reputation-based collaborative management method for inter-domain routing security, Journal of Software, 21, 3, pp. 505-515, (2010)
- [10] Eschenauer L., Gligor V.D., Baras J., On trust establishment in mobile ad-hoc networks, Proceedings of the 10th International Security Protocols Workshop, pp. 47-66, (2002)