Author:
Elamathi N.,Jayashri S.,Pitchai R.
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference34 articles.
1. Aggarwal R, Sharma H, Gupta D (2011) Analysis of various attacks over BB84 quantum key distribution protocol. Int J Comput Appl 20(8):28–31
2. Bellovin S, Bush R, Griffin T, Rexford J (2001) Slowing routing table growth by filtering based on address allocation policies
3. Bruhadeshwar B, Kulkarni SS, Liu AX (2008) Symmetric key approaches to securing BGP a little bit trust is enough. In: ESORICS. Springer, pp 82–96
4. Chang G, Arianezhad M, Trajkovic L (2015) Using resource public key infrastructure secure border gateway protocol. In: IEEE Canadian conference on electrical and computer engineering (CCECE)
5. Cheung S (1997) An efficient message authentication scheme for link state routing. In: 13th Annual computer security applications conference, San Diego, CA, December 1997, pp 90–98
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献