Access the full text.
Sign up today, get DeepDyve free for 14 days.
A. Birrell (1985)
Secure communication using remote procedure callsACM Trans. Comput. Syst., 3
R. Rivest (1990)
The MD5 Message-Digest Algorithm
M. Satyanarayanan (1989)
Integrating security in a large distributed systemACM Trans. Comput. Syst., 7
R. Rivest, A. Shamir, L. Adleman (1978)
A method for obtaining digital signatures and public-key cryptosystemsCommun. ACM, 21
J. Moy (1989)
OSPF specificationRFC, 1131
C. Wood (1985)
Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50Comput. Secur., 4
J. McQuillan (1974)
Adaptive routing algorithms for distributed computer networks
R. Perlman (1988)
Network layer protocols with Byzantine robustness
Charles Rutgers (1991)
An introduction to igrp
G. Finn (1988)
Reducing the Vulnerability of Dynamic Computer Networks
D. Davies, W. Price (1984)
Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Fu
E. Dijkstra (1959)
A note on two problems in connexion with graphsNumerische Mathematik, 1
(1989)
Digital Equipment CorporationIntermeAiate System to Intermediate System Intra-Domain Routeing Exchange Protocol
C. Hedrick (1988)
Routing Information ProtocolRFC, 1058
Victor Voydock, S. Kent (1983)
Security Mechanisms in High-Level Network ProtocolsACM Comput. Surv., 15
R. Needham, M. Schroeder (1978)
Using encryption for authentication in large networks of computersCommun. ACM, 21
B. Efron, R. Tibshirani (1994)
An Introduction to the Bootstrap
There are two sources of threats to secure operation of routing protocols in networks. The first source of threats is subverted routers that legitimately participate in a routing protocol. The second source of threats is intruders which may illegally attempt to interfere in routing protocols by masquerading as routers. In this paper, we first analyse the security requirements of network routing protocols and then discuss the necessary measures which can be adopted to make the operation of these protocols secure.
ACM SIGSAC Review – Association for Computing Machinery
Published: Apr 1, 1993
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.