Bush et al., 2009 - Google Patents
The RPKI & Origin ValidationBush et al., 2009
View PDF- Document ID
- 15219777383761617791
- Author
- Bush R
- Austein R
- Bellovin S
- Elkins M
- Publication year
External Links
Snippet
The RPKI & Origin Validation Page 1 The RPKI & Origin Validation ARIN / San Juan 2011.04.10
Randy Bush <randy@psg.com> Rob Austein <sra@isc.org> Steve Bellovin <smb@cs.columbia.edu>
And a cast of thousands! Well, dozens :) 2011.04.10 rpki origin 1 Page 2 2 • How long can we …
- 238000010200 validation analysis 0 title description 8
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bush et al. | The resource public key infrastructure (RPKI) to router protocol | |
Casado et al. | SANE: A Protection Architecture for Enterprise Networks. | |
US9654482B2 (en) | Overcoming circular dependencies when bootstrapping an RPKI site | |
Chuat et al. | The complete guide to scion | |
Ahmed et al. | IPv6 neighbor discovery protocol specifications, threats and countermeasures: a survey | |
Andersen et al. | Accountable internet protocol (AIP) | |
US11973617B2 (en) | Border gateway protocol (BGP) hijacks prefix signing using public/private keys | |
EP3328023B1 (en) | Authentication of users in a computer network | |
Mittal et al. | Mirage: Towards deployable DDoS defense for Web applications | |
Gavrichenkov | Breaking HTTPS with BGP hijacking | |
Grothoff et al. | Toward secure name resolution on the internet | |
Sriram et al. | Resilient Interdomain Traffic Exchange | |
US20140006777A1 (en) | Establishing Secure Communication Between Networks | |
Cho et al. | TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things | |
WO2016202397A1 (en) | Dns based pki system | |
Rafiee et al. | A secure, flexible framework for dns authentication in ipv6 autoconfiguration | |
Bush et al. | The RPKI & Origin Validation | |
ENISA | About ENISA | |
AT&T | 0.8-21shots.eps | |
Bush et al. | RFC 6810: The Resource Public Key Infrastructure (RPKI) to Router Protocol | |
Yang et al. | Internet Protocol Made Accountable. | |
Su et al. | Secure DHCPv6 that uses RSA authentication integrated with self-certified address | |
Chang et al. | Using resource public key infrastructure for secure border gateway protocol | |
Lin et al. | SAGA: Secure auto-configurable gateway architecture for smart home | |
Yun et al. | The policy-based AS_PATH verification to monitor AS path hijacking |