[PDF][PDF] Using a Variation of Elgamal Signature to Support Fast and Lazy Authenticating Origin Autonomous Systems.

B Yang - Journal of Multimedia, 2014 - Citeseer
About the schemes for authenticating origin autonomous systems, related documents think it
is appropriate to authenticate address attestations and related public keys only using the …

RFC 6489: Certification Authority (CA) Key Rollover in the Resource Public Key Infrastructure (RPKI)

G Huston, G Michaelson, S Kent - 2012 - dl.acm.org
This document describes how a Certification Authority (CA) in the Resource Public Key
Infrastructure (RPKI) performs a planned rollover of its key pair. This document also notes …

RFC 6810: The Resource Public Key Infrastructure (RPKI) to Router Protocol

R Bush, R Austein - 2013 - dl.acm.org
In order to verifiably validate the origin Autonomous Systems of BGP announcements,
routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure …

On the benefits of keeping path identifiers secret in future Internet: A DDoS perspective

H Luo, Z Chen, J Li, T Vasilakos - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In recent years, there are increasing interests in using path identifiers (PIDs) as inter-domain
routing objects in the future Internet. While PIDs are advertised throughout the Internet in …

[PDF][PDF] Cryptographically secure detection of mirror worlds

H Stoyanov, S Goldberg - 2014 - mit.edu
Abstract The Resource Public Key Infrastructure (RPKI) has been introduced as a way of
authorizing Border Gateway Protocol (BGP) route announcements. The highly centralized …

[引用][C] BGP path verification mechanism based on ID.

N Wang, CX Gu, BQ Wang - Jisuanji Gongcheng/ Computer Engineering, 2007

[PDF][PDF] Survey of Papers on Securing Interdomain Routing

E Wittmer, S Yuan - el-wittmer.github.io
This survey investigates the problems that have existed in interdomain routing security and
strategies that exist for mitigating these problems. We also discuss the effectiveness of these …

[PDF][PDF] Internet Engineering Task Force (IETF) R. Bush Request for Comments: 7128 Internet Initiative Japan Category: Informational R. Austein

K Patel, H Gredler, M Waehlisch - Resource, 2014 - dl.xkwy2018.com
This document is an implementation report for the Resource Public Key Infrastructure (RPKI)
Router protocol as defined in RFC 6810. The authors did not verify the accuracy of the …

SC-OA: A secure and efficient scheme for origin authentication of interdomain routing in cloud computing networks

Z Le, N Xiong, B Yang, Y Zhou - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
IP prefix hijacking is one of the top threats in the cloud computing Internets. Based on
cryptography, many schemes for preventing prefix hijacks have been proposed. Securing …

One hop for RPKI, one giant leap for BGP security

A Cohen, Y Gilad, A Herzberg, M Schapira - Proceedings of the 14th …, 2015 - dl.acm.org
Extensive standardization and R&D efforts are dedicated to establishing secure interdomain
routing. These efforts focus on two complementary mechanisms: origin authentication with …