D Farinacci, V Fuller, D Meyer, D Lewis - 2013 - dl.acm.org
This document describes a network-layer-based protocol that enables separation of IP addresses into two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators …
MA Nugraha, DW Sudiharto… - … Conference on Electrical …, 2017 - ieeexplore.ieee.org
Vehicular Ad-Hoc Network (VANET) is a network technology which uses vehicles as mobile nodes to form a communication network. In order to communicate, all vehicles have to use …
B Li, JW Atwood - Computer Networks, 2016 - Elsevier
The classical service model of IP multicast is open; anyone can receive multicast data. When using this model, it is impossible to ensure that receivers are authorized to receive the data …
To build secure network-based systems, it is important to ensure the authenticity and integrity of the inter-router control message exchanges. Authenticating neighbors and …
N Prajapati - 2014 - spectrum.library.concordia.ca
With the rise in internet traffic surveillance and monitoring activities, the routing infrastructure has become an obvious target of attack as compromised routers can be used to stage large …
Y Huang, JW Atwood - 2018 IEEE Canadian Conference on …, 2018 - ieeexplore.ieee.org
Key Management Protocols (KMPs) are intended to manage cryptographic keys in a cryptosystem. KMPs have been standardized for Internet Protocol Security (IPsec), and …
A Saxena, M Bhatia, OBFD Authentication - 2017 - watersprings.org
Network Working Group M. Jethanandani Internet-Draft Cisco Systems Intended status: Standards Track A. Mishra Expire Page 1 Network Working Group M. Jethanandani Internet-Draft …
Network Working Group M. Jethanandani Internet-Draft Cisco Systems Intended status: Standards Track A. Mishra Expire Page 1 Network Working Group M. Jethanandani Internet-Draft …
Network Working Group M. Jethanandani Internet-Draft Cisco Systems Intended status: Standards Track A. Mishra Expire Page 1 Network Working Group M. Jethanandani Internet-Draft …