The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

DistNSE: Distributed network service embedding across multiple providers

A Abujoda, P Papadimitriou - 2016 8th international conference …, 2016 - ieeexplore.ieee.org
Network function virtualization (NFV) brings significant benefits by outsourcing network
functions (NFs) to virtualized datacenters and enabling new business models, eg NF as a …

MIDAS: Middlebox discovery and selection for on-path flow processing

A Abujoda, P Papadimitriou - 2015 7th international conference …, 2015 - ieeexplore.ieee.org
The deployment of micro-datacenters for network function virtualization (NFV) by Internet
Service Providers creates opportunities for flow processing along the traffic path. On-path …

Generating shares of secret data

G Smith, R Boreli, A Friedman, M Djatmiko - US Patent 10,360,392, 2019 - Google Patents
This disclosure relates to generating shares of secret data represented by secret data
elements based on a first threshold for the number of shares that allow determining the …

Disco: Fast, good, and cheap outage detection

A Shah, R Fontugne, E Aben… - 2017 Network Traffic …, 2017 - ieeexplore.ieee.org
Outage detection has been studied from different angles, such as active probing, analysis of
background radiations, or control plane information. We approach outage detection from a …

SDN-based privacy preserving cross domain routing

Q Chen, S Shi, X Li, C Qian… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Today's large-scale enterprise networks, data center networks, and wide area networks can
be decomposed into multiple administrative or geographical domains. Domains may be …

Privacy-preserving compressive sensing for real-time traffic monitoring in urban city

W Guo, J Li, X Liu, Y Yang - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
Traffic monitoring is a crucial means to solve traffic problems by collecting vehicular datain
an urban road network. However, the leakage of sensitive data increases the risk of …

Secure voting in the cloud using homomorphic encryption and mobile agents

MA Will, B Nicholson, M Tiehuis… - … Conference on Cloud …, 2015 - ieeexplore.ieee.org
While governments are transitioning to the cloud to leverage efficiency, transparency and
accessibility advantages, public opinion-the backbone of democracy-is being left behind …

Privacy-preserving cross-domain routing optimization-a cryptographic approach

Q Chen, C Qian, S Zhong - 2015 IEEE 23rd International …, 2015 - ieeexplore.ieee.org
Today's large-scale enterprise networks, data center networks, and wide area networks can
be decomposed into multiple administrative or geographical domains. Domains may be …

Systems for characterizing Internet routing

A Shah - 2018 - search.proquest.com
Today the Internet plays a critical role in our lives; we rely on it for communication, business,
and more recently, smart home operations. Users expect high performance and availability …