Origin authentication scheme against BGP address prefix hijacking

被引:0
|
作者
机构
[1] Liu, Zhi-Hui
[2] Sun, Bin
[3] Gu, Li-Ze
[4] Yang, Yi-Xian
来源
Liu, Z.-H. (kevin2296@gmail.com) | 1908年 / Chinese Academy of Sciences卷 / 23期
关键词
27;
D O I
10.3724/SP.J.1001.2012.04125
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] HC-BGP: A Light-weight and Flexible Scheme for Securing Prefix Ownership
    Zhang, Ying
    Zhang, Zheng
    Mao, Z. Morley
    Hu, Y. Charlie
    2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, : 23 - +
  • [22] On the design of fast prefix-preserving IP address anonymization scheme
    Zhang, Qianli
    Wang, Jilong
    Li, Xing
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 177 - 188
  • [23] OTP Bidirectional Authentication Scheme Based on MAC Address
    Xu, Jingai
    Qi, Jiang
    Ye, Xi
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1148 - 1152
  • [24] A memory-efficient scheme for address lookup using compact prefix tries
    Sarda, A
    Sen, A
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 3943 - 3947
  • [25] Divide-and-conquer: A scheme for IPv6 address longest prefix matching
    Li, Zhenqiang
    Deng, Xiaohong
    Ma, Hongxiao
    Ma, Yan
    HPSR: 2006 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2006, : 37 - +
  • [26] An Effective Device and Data Origin Authentication Scheme in Home Networks
    Shin, Soobok
    Yeh, Hongjin
    Kim, Kangseok
    2012 9TH INTERNATIONAL CONFERENCE & EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2012,
  • [27] A Spoofing Attack against a Cancelable Biometric Authentication Scheme
    Izu, Tetsuya
    Sakemi, Yumi
    Takenaka, Masahiko
    Torii, Naoya
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 234 - 239
  • [28] SRJE: Decentralized Authentication Scheme against Sybil Attacks
    Mashimo, Yo
    Yasutomi, Masanori
    Shigeno, Hiroshi
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 220 - 225
  • [29] ECCIA: An Identity Authentication Scheme against IFAs in NDNs
    Shi, Yingjuan
    Ma, Maode
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 13 - 18
  • [30] Interactive authentication scheme against collusion attack for virtual enterprises
    Zhang, Ya-Ling
    Zhang, Jing
    Wang, Xiao-Feng
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2008, 14 (07): : 1410 - 1416