Secure interoperable architecture construction for overlay networks

P Jyothirmai, JS Raj - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks
to address the technical issues in heterogeneous networks that may lack continuous …

[引用][C] Towards a more functional and secure network infrastructure

D Adkins, K Lakshminarayanan, A Perrig, I Stoica… - 2003

Riappa: a robust identity assignment protocol for p2p overlays

J Caubet, O Esparza, JL Muñoz, J Alins… - Security and …, 2014 - Wiley Online Library
ABSTRACT Peer‐to‐peer (P2P) overlay networks have been proposed to solve routing
problems of big distributed infrastructures, even for Internet scale. But the research …

Secure overlay network design

L Li, M Mahdian, VS Mirrokni - Algorithmica, 2010 - Springer
Due to the increasing security threats on the Internet, new overlay network architectures
have been proposed to secure privileged services. In these architectures, the application …

RAQNet: A topology-aware overlay network

SI Mirrezaei, J Shahparian, M Ghodsi - … AIMS 2007, Oslo, Norway, June 21 …, 2007 - Springer
Peer-to-peer overlay networks provide a useful infrastructure for building distributed
applications. These networks provide efficient and fault-tolerant routing and object locating …

Chord-PKI: A distributed trust infrastructure based on P2P networks

A Avramidis, P Kotzanikolaou, C Douligeris… - Computer Networks, 2012 - Elsevier
Many P2P applications require security services such as privacy, anonymity, authentication,
and non-repudiation. Such services could be provided through a hierarchical Public Key …

[PDF][PDF] Countering DDoS Attacks with Multi-Path Overlay Networks

A Stavrou, AD Keromytis - 2006 - cs.columbia.edu
Distributed Denial of Service (DDoS) has emerged as a major threat to the operation of
online network services [1, 2, 3]. Current forms of DDoS attacks implicate multiple groups of …

Mediated overlay services (MOSES): Network security as a composable service

S Sidiroglou, A Stavrou… - 2007 IEEE Sarnoff …, 2007 - ieeexplore.ieee.org
In recent years, organizations have been shifting focus to their core business competencies,
and reducing total cost of ownership (TCO) associated with training and management of …

[PDF][PDF] OverDoSe: A generic DDoS protection service using an overlay network

E Shi, I Stoica, D Andersen, A Perrig - 2006 - reports-archive.adm.cs.cmu.edu
We present the design and implementation of OverDoSe, an overlay network offering
generic DDoS protection for targeted sites. OverDoSe clients and servers are isolated at the …

Practical intrusion-tolerant networks

D Obenshain, T Tantillo, A Babay… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
As the Internet becomes an important part of the infrastructure our society depends on, it is
crucial to construct networks that are able to work even when part of the network is …