共 50 条
- [21] Securing BGP Networks using Consistent Check Algorithm IMECS 2009: INTERNATIONAL MULTI-CONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2009, : 387 - +
- [23] An operational approach to validate the path of BGP ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2008, 5022 : 133 - 143
- [25] Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 160 - 171
- [26] A plan-commit-prove protocol for secure verification of traversal path 2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 458 - 462
- [27] Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 82 - +
- [28] Data structure optimization of AS_PATH in BGP NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 781 - 788
- [29] Exploring the Benefit of Path Plausibility Algorithms in BGP PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
- [30] Exploring the Benefit of Path Plausibility Algorithms in BGP Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024,