The state of affairs in BGP security: A survey of attacks and defenses
A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
DistNSE: Distributed network service embedding across multiple providers
A Abujoda, P Papadimitriou - 2016 8th international conference …, 2016 - ieeexplore.ieee.org
Network function virtualization (NFV) brings significant benefits by outsourcing network
functions (NFs) to virtualized datacenters and enabling new business models, eg NF as a …
functions (NFs) to virtualized datacenters and enabling new business models, eg NF as a …
MIDAS: Middlebox discovery and selection for on-path flow processing
A Abujoda, P Papadimitriou - 2015 7th international conference …, 2015 - ieeexplore.ieee.org
The deployment of micro-datacenters for network function virtualization (NFV) by Internet
Service Providers creates opportunities for flow processing along the traffic path. On-path …
Service Providers creates opportunities for flow processing along the traffic path. On-path …
Generating shares of secret data
This disclosure relates to generating shares of secret data represented by secret data
elements based on a first threshold for the number of shares that allow determining the …
elements based on a first threshold for the number of shares that allow determining the …
Disco: Fast, good, and cheap outage detection
Outage detection has been studied from different angles, such as active probing, analysis of
background radiations, or control plane information. We approach outage detection from a …
background radiations, or control plane information. We approach outage detection from a …
SDN-based privacy preserving cross domain routing
Today's large-scale enterprise networks, data center networks, and wide area networks can
be decomposed into multiple administrative or geographical domains. Domains may be …
be decomposed into multiple administrative or geographical domains. Domains may be …
Privacy-preserving compressive sensing for real-time traffic monitoring in urban city
Traffic monitoring is a crucial means to solve traffic problems by collecting vehicular datain
an urban road network. However, the leakage of sensitive data increases the risk of …
an urban road network. However, the leakage of sensitive data increases the risk of …
Secure voting in the cloud using homomorphic encryption and mobile agents
MA Will, B Nicholson, M Tiehuis… - … Conference on Cloud …, 2015 - ieeexplore.ieee.org
While governments are transitioning to the cloud to leverage efficiency, transparency and
accessibility advantages, public opinion-the backbone of democracy-is being left behind …
accessibility advantages, public opinion-the backbone of democracy-is being left behind …
Privacy-preserving cross-domain routing optimization-a cryptographic approach
Today's large-scale enterprise networks, data center networks, and wide area networks can
be decomposed into multiple administrative or geographical domains. Domains may be …
be decomposed into multiple administrative or geographical domains. Domains may be …
Systems for characterizing Internet routing
A Shah - 2018 - search.proquest.com
Today the Internet plays a critical role in our lives; we rely on it for communication, business,
and more recently, smart home operations. Users expect high performance and availability …
and more recently, smart home operations. Users expect high performance and availability …