[PDF][PDF] Secure and Scalable Deployment of Resource Public Key Infrastructure (RPKI).

Z Yan, G Geng, H Nakazato, YJ Park - 2018 - isyou.info
Abstract The Border Gateway Protocol (BGP) is considered to be vulnerable to some typical
security risks due to its lack of schemes to verify the received BGP messages. To address …

[PDF][PDF] Secure and Scalable Deployment of Resource Public Key Infrastructure (RPKI)

Z Yan, G Geng, H Nakazato, YJ Park - Journal of Internet Services and …, 2018 - jisis.org
Abstract The Border Gateway Protocol (BGP) is considered to be vulnerable to some typical
security risks due to its lack of schemes to verify the received BGP messages. To address …

[PDF][PDF] Secure and Scalable Deployment of Resource Public Key Infrastructure (RPKI)

Z Yan, G Geng, H Nakazato… - Journal of Internet Services …, 2018 - scholar.archive.org
Abstract The Border Gateway Protocol (BGP) is considered to be vulnerable to some typical
security risks due to its lack of schemes to verify the received BGP messages. To address …