• No results found

[PDF] Top 20 A Trusted Centralized Public Key to Secure Border Gateway Protocol

Has 10000 "A Trusted Centralized Public Key to Secure Border Gateway Protocol" found on our website. Below are the top 20 most common "A Trusted Centralized Public Key to Secure Border Gateway Protocol".

A Trusted Centralized Public Key to Secure Border Gateway Protocol

A Trusted Centralized Public Key to Secure Border Gateway Protocol

... The Secure Border Gateway Protocol (S-BGP) is used when two different Autonomous System communicate with each other and upon reception of UPDATE from neighbor Autonomous ...makes ... See full document

5

Internet Infrastructure Security

Internet Infrastructure Security

... Seo, “Public-key infrastructure for the Secure Border Gateway Protocol (S-BGP)”, Proc. Darpa Information Survivability Conference and Exposition II, vol[r] ... See full document

30

Toward a Fault-Tolerant Border Gateway Protocol

Toward a Fault-Tolerant Border Gateway Protocol

... use Public Key Infrastructure (PKI) to verify route ...as Secure BGP (S-BGP), assumes two PKI hierarchies which correspond to the practical assignment of IP prefixes and AS ... See full document

169

Using EMV cards for Single Sign-On

Using EMV cards for Single Sign-On

... authentication protocol directly with the user, SPs acquire the necessary authentication assertions from the CS, ac- cording to the protocol described in section ... See full document

15

Suite B Implementer s Guide to NIST SP A July 28, 2009

Suite B Implementer s Guide to NIST SP A July 28, 2009

... a key-agreement transaction, properly-defined key confirmation may also permit the recipient to obtain assurance that the provider had knowledge of the private key corresponding to the provider’s ... See full document

33

PoTS -  A  Secure  Proof  of  TEE-Stake  for  Permissionless  Blockchains

PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains

... our protocol leverages the ledger functionality of the blockchain itself to allow for an unlimited number of key ...our protocol can tolerate compromised TEEs as long as the adversary does not ... See full document

19

Border gateway protocol artificial optimization to improve network performance on ddos attacks

Border gateway protocol artificial optimization to improve network performance on ddos attacks

... vector protocol which varies according to the network equates and internal ...more secure and accurate with the use of authentication ...authorization key for communication purpose and provides high ... See full document

8

SEECH: Secure and Energy Efficient Centralized Routing Protocol for Hierarchical WSN

SEECH: Secure and Energy Efficient Centralized Routing Protocol for Hierarchical WSN

... Wireless sensor networks (WSNs) are built up of sensor nodes (SNs), which consist of sensing, computing, communication, actuation and power components that cooperatively perform the task of collecting relevant data and ... See full document

5

Upgrading Internet Service Provider using Multi Protocol Label Switching and Virtual Private Network

Upgrading Internet Service Provider using Multi Protocol Label Switching and Virtual Private Network

... The proposed system MPLS labels describes the packet switching technique while the previous work discussed about the circuit switching technique. They have Multi Protocol Label Switching (MPLS) and virtual routing ... See full document

5

A Novel Secure Terminal System Based on Trusted Hardware: U-Key

A Novel Secure Terminal System Based on Trusted Hardware: U-Key

... a trusted hardware, the function of which mainly includes identity authentication; secure storage of sensitive or important data, symmetrical-key and unsymmetrical-key encryption and so ...the ... See full document

8

Anonymous Routing in Trust Valued MANETs Prior to the Deployment of Onion Routing

Anonymous Routing in Trust Valued MANETs Prior to the Deployment of Onion Routing

... and secure communications with authentication and ...a trusted network management, implicitly when the nodes do not have any prior knowledge of each other to give assurance that the information is given ... See full document

8

Passive IP Trace back using Border Gateway Protocol (BGP)

Passive IP Trace back using Border Gateway Protocol (BGP)

... Our approach is a redux from the existing passive IP trace back. The routing protocol we are using here is BGP (Border Gateway protocol) [10]. This protocol holds good for the ... See full document

5

Route 
		reliability ranking algorithm for prefix hijacking attacks in border 
		gateway protocol

Route reliability ranking algorithm for prefix hijacking attacks in border gateway protocol

... In this paper, we have proposed route reliability ranking algorithm to defend against Prefix Hijacking Attack on border gateway protocol (BGP). The algorithm verifies the accuracy of AS path when a ... See full document

7

Password-authenticated key exchange using efficient MACs

Password-authenticated key exchange using efficient MACs

... We consider static corruptions, meaning that adver- saries make their decision as to whom to corrupt indepen- dently of the network traffic. As a consequence, the ad- versary has complete control over a set of corrupted ... See full document

9

Cross-Domain  Password-Based  Authenticated  Key  Exchange  Revisited

Cross-Domain Password-Based Authenticated Key Exchange Revisited

... 4PAKE protocol that uses 2PAKE and 2AAKE as building blocks and showed that it is provably secure in our security model; however, no implementation results were ...earlier protocol shown in [19] by ... See full document

31

Configuring and Testing Border Gateway Protocol (BGP) on Basis of Cisco Hardware and Linux Gentoo with Quagga Package (Zebra)

Configuring and Testing Border Gateway Protocol (BGP) on Basis of Cisco Hardware and Linux Gentoo with Quagga Package (Zebra)

... In the article mechanisms of functioning of the dynamic routing protocol "BGP" are examined in details. Guides for configuring Cisco routers and Quagga package on basis of Gentoo Linux are given. A stand ... See full document

19

Certificateless Public Key cryptosystems For Mobile Ad hoc Networks

Certificateless Public Key cryptosystems For Mobile Ad hoc Networks

... proposing secure routing protocols ...to Public Key Infrastructure (PKI) made the use of Identity Based cryptographic schemes one of the most popular cryptosystems in such ...private key from ... See full document

8

a secure, collaboration gateway...

a secure, collaboration gateway...

... The Swurv Environment (SE) is a secure, multi tasking interface for managing, transacting and delivering information, Web Services and Web Applications, via the Internet. SE allows services from different vendors ... See full document

5

Public Key Cryptography by Centralized offline Server in Mission-Critical Networks

Public Key Cryptography by Centralized offline Server in Mission-Critical Networks

... SMOCK public keys via the SSL channel from a trusted authority before secure ...sender’s public keys, and sends the encrypted message to the ... See full document

7

Authenticated  key  exchange  for  SIDH

Authenticated key exchange for SIDH

... shared key between two parties. This can be done using trusted third parties, using symmetric crypto, using an interactive protocol like Diffie-Hellman key exchange, or using public ... See full document

17

Show all 10000 documents...