The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

[图书][B] SCION: a secure Internet architecture

A Perrig, P Szalachowski, RM Reischuk, L Chuat - 2017 - Springer
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and Xin Zhang to consider …

Securing DNSSEC keys via threshold ECDSA from generic MPC

A Dalskov, C Orlandi, M Keller, K Shrishak… - … –ESORICS 2020: 25th …, 2020 - Springer
Deployment of DNSSEC, although increasing, still suffers from many practical issues that
results in a false sense of security. While many domains outsource zone management, they …

Kill switches, remote deletion, and intelligent agents: Framing everyday household cybersecurity in the internet of things

JA Oravec - Technology in Society, 2017 - Elsevier
Increasing utilizations of kill switches, remote deletion, and intelligent agents as a part of
“Internet of Things”(IoT) architectures present emerging cybersecurity and privacy …

Formal verification of secure forwarding protocols

T Klenze, C Sprenger, D Basin - 2021 IEEE 34th Computer …, 2021 - ieeexplore.ieee.org
Today's Internet is built on decades-old networking protocols that lack scalability, reliability,
and security. In response, the networking community has developed path-aware Internet …

IsaNet: A framework for verifying secure data plane protocols

T Klenze, C Sprenger, D Basin - Journal of Computer Security, 2023 - content.iospress.com
Today's Internet is built on decades-old networking protocols that lack scalability, reliability
and security. In response, the networking community has developed path-aware Internet …

DIIA: Blockchain‐Based Decentralized Infrastructure for Internet Accountability

P Li, J Su, X Wang, Q Xing - Security and Communication …, 2021 - Wiley Online Library
The Internet lacking accountability suffers from IP address spoofing, prefix hijacking, and
DDoS attacks. Global PKI‐based accountable network involves harmful centralized authority …

[PDF][PDF] Swiss post E‐voting scope 4: Network security analysis

C Krähenbühl, M Wyss, R Burkhard, J Wanner, A Perrig - 2022 - bk.admin.ch
In this report, we summarize our evaluation of the Swiss Post e-voting system from the
perspective of network security. Due to the limited time frame of the Scope 4 testing period …

Formal Development of Secure Data Plane Protocols

T Klenze - 2021 - research-collection.ethz.ch
Today's Internet is built on decades-old networking protocols that lack scalability, reliability
and security. In response, the networking community has developed path-aware Internet …

[PDF][PDF] Key Management

C Krähenbühl, A Perrig - Trends in Data Protection and Encryption …, 2023 - library.oapen.org
Key management describes how cryptographic keys are created, securely stored, distributed
to the respective key holders, and used in accordance with protocol specifications. It is thus …