MASK: practical source and path verification based on Multi-AS-Key

S Fu, Q Li, M Zhu, X Wang, S Yao… - IEEE/ACM …, 2022 - ieeexplore.ieee.org
The source and path verification in Path-Aware Networking considers the two critical
issues:(1) end hosts could verify that the network follows their forwarding decisions, and (2) …

MASK: Practical Source and Path Verification based on Multi-AS-Key

S Fu, K Xu, Q Li, X Wang, S Yao, Y Guo, X Du - openreview.net
The source and path verification in path-aware Internet consider the two critical issues:(1)
end hosts could verify that their forwarding decisions followed by the network,(2) both …

MASK: Practical Source and Path Verification Based on Multi-AS-Key

S Fu, Q Li, M Zhu, X Wang, S Yao, Y Guo… - IEEE/ACM Transactions …, 2023 - computer.org
The source and path verification in Path-Aware Networking considers the two critical
issues:(1) end hosts could verify that the network follows their forwarding decisions, and (2) …

[PDF][PDF] MASK: Practical Source and Path Verification Based on Multi-AS-Key

QL SongtaoFu, M Zhu, X Wang, S Yao… - IEEE/ACM …, 2023 - thucsnet.com
Ke Xu is with the Department of Computer Science and Technology, Beijing National
Research Center for Information Science and Technology (BNRist), Tsinghua University …

MASK: Practical Source and Path Verification based on Multi-AS-Key

S Fu, K Xu, Q Li, X Wang, S Yao… - 2021 IEEE/ACM 29th …, 2021 - ieeexplore.ieee.org
The source and path verification in path-aware Internet consider the two critical issues:(1)
end hosts could verify that their forwarding decisions followed by the network,(2) both …

[PDF][PDF] MASK: Practical Source and Path Verification Based on Multi-AS-Key

QL SongtaoFu, M Zhu, X Wang, S Yao, Y Guo, X Du… - thucsnet.com
Ke Xu is with the Department of Computer Science and Technology, Beijing National
Research Center for Information Science and Technology (BNRist), Tsinghua University …