The Complete Guide to SCION
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
[图书][B] SCION: a secure Internet architecture
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and Xin Zhang to consider …
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and Xin Zhang to consider …
Securing DNSSEC keys via threshold ECDSA from generic MPC
Deployment of DNSSEC, although increasing, still suffers from many practical issues that
results in a false sense of security. While many domains outsource zone management, they …
results in a false sense of security. While many domains outsource zone management, they …
Kill switches, remote deletion, and intelligent agents: Framing everyday household cybersecurity in the internet of things
JA Oravec - Technology in Society, 2017 - Elsevier
Increasing utilizations of kill switches, remote deletion, and intelligent agents as a part of
“Internet of Things”(IoT) architectures present emerging cybersecurity and privacy …
“Internet of Things”(IoT) architectures present emerging cybersecurity and privacy …
Formal verification of secure forwarding protocols
Today's Internet is built on decades-old networking protocols that lack scalability, reliability,
and security. In response, the networking community has developed path-aware Internet …
and security. In response, the networking community has developed path-aware Internet …
IsaNet: A framework for verifying secure data plane protocols
Today's Internet is built on decades-old networking protocols that lack scalability, reliability
and security. In response, the networking community has developed path-aware Internet …
and security. In response, the networking community has developed path-aware Internet …
DIIA: Blockchain‐Based Decentralized Infrastructure for Internet Accountability
The Internet lacking accountability suffers from IP address spoofing, prefix hijacking, and
DDoS attacks. Global PKI‐based accountable network involves harmful centralized authority …
DDoS attacks. Global PKI‐based accountable network involves harmful centralized authority …
[PDF][PDF] Swiss post E‐voting scope 4: Network security analysis
In this report, we summarize our evaluation of the Swiss Post e-voting system from the
perspective of network security. Due to the limited time frame of the Scope 4 testing period …
perspective of network security. Due to the limited time frame of the Scope 4 testing period …
Formal Development of Secure Data Plane Protocols
T Klenze - 2021 - research-collection.ethz.ch
Today's Internet is built on decades-old networking protocols that lack scalability, reliability
and security. In response, the networking community has developed path-aware Internet …
and security. In response, the networking community has developed path-aware Internet …
[PDF][PDF] Key Management
C Krähenbühl, A Perrig - Trends in Data Protection and Encryption …, 2023 - library.oapen.org
Key management describes how cryptographic keys are created, securely stored, distributed
to the respective key holders, and used in accordance with protocol specifications. It is thus …
to the respective key holders, and used in accordance with protocol specifications. It is thus …