Origin authentication scheme against BGP address prefix hijacking

被引:0
|
作者
机构
[1] Liu, Zhi-Hui
[2] Sun, Bin
[3] Gu, Li-Ze
[4] Yang, Yi-Xian
来源
Liu, Z.-H. (kevin2296@gmail.com) | 1908年 / Chinese Academy of Sciences卷 / 23期
关键词
27;
D O I
10.3724/SP.J.1001.2012.04125
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Graphical Password Authentication Scheme Against Credential Leakage Attacks
    Chen J.
    Xu C.-X.
    Zhang Y.
    Jiang C.-S.
    Han Y.-X.
    Cao C.-C.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (12): : 5787 - 5806
  • [32] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [33] Media Access Control (MAC) address-based group key authentication scheme
    Hong, Sunghyuck
    Lopez-Benitez, Noe
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 4, 2005, : 160 - 164
  • [34] Simulation Study of BGP Origin Validation Effect Against Mis-Origination with Internet Topology
    Ando, Masahito
    Okada, Masayuki
    Kanaoka, Akira
    2017 12TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2017, : 75 - 82
  • [35] A Lightweight authentication scheme for IoT against Rogue Base Station Attacks
    Salim, Mikail Mohammed
    Kang, Jungho
    Pan, Yi
    Park, Jong Hyuk
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (11) : 11735 - 11755
  • [36] Research on User Authentication Scheme against the Man-in-the-Middle Attack
    Zhou, Xiancun
    Xiong, Yan
    Liu, Renjin
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 1 - 8
  • [37] A new password authentication scheme resistant against shoulder surfing attack
    Al-Husainy, Mohammed Abbas Fadhil
    Uliyan, Diaa Mohammed
    Journal of Technology, 2019, 34 (01): : 25 - 35
  • [38] An Efficient IP Address Lookup Scheme. Using Balanced Binary Search with Minimal Entry and Optimal Prefix Vector
    Park, Hyuntae
    Hong, Hyejeong
    Kang, Sungho
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (11) : 3128 - 3131
  • [39] Efficiency optimisation signature scheme for time-critical multicast data origin authentication
    Wang, Yichuan
    Ma, Jianfeng
    Lu, Xiang
    Lu, Di
    Zhang, Liumei
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2016, 7 (01) : 1 - 11
  • [40] Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme
    Fan, JL
    Xu, J
    Ammar, MH
    Moon, SB
    COMPUTER NETWORKS, 2004, 46 (02) : 253 - 272