He et al., 2023 - Google Patents
Hummingbird: Dynamic path validation with hidden equal-probability samplingHe et al., 2023
- Document ID
- 4542485849060324241
- Author
- He A
- Li X
- Fu J
- Hu H
- Bu K
- Miao C
- Ren K
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
Path validation has already been incrementally deployed in the Internet architecture. It secures packet forwarding by enabling end hosts to negotiate specific forwarding paths and enforcing on-path routers to prove their forwarding behaviors along these paths. Most …
- 241000272878 Apodiformes 0 title abstract description 121
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kim et al. | Lightweight source authentication and path validation | |
He et al. | Hummingbird: Dynamic path validation with hidden equal-probability sampling | |
Bu et al. | Unveiling the mystery of internet packet forwarding: A survey of network path validation | |
US11902249B2 (en) | Device for validating a message conveyed via a network | |
CN111726346B (en) | Data secure transmission method, device and system | |
Mishra | Blockchain-based security in smart grid network | |
Sengupta et al. | Privacy-preserving network path validation | |
He et al. | Atomos: Constant-size path validation proof | |
Pattaranantakul et al. | On achieving trustworthy service function chaining | |
Bao et al. | A probabilistic and distributed validation framework based on blockchain for artificial intelligence of things | |
Ghosh et al. | Multi-phase quantum resistant framework for secure communication in SCADA systems | |
Tennekoon et al. | Prototype implementation of fast and secure traceability service over public networks | |
Bu et al. | What's (not) validating network paths: A survey | |
Li et al. | Stealthpath: Privacy-preserving path validation in the data plane of path-aware networks | |
Balyk et al. | A survey of modern IP traceback methodologies | |
He et al. | Symphony: Path validation at scale | |
Ghani et al. | Secure in-packet Bloom filter forwarding on the NetFPGA | |
He et al. | Swiftparade: Anti-burst multipath validation | |
Su et al. | Privacy preserving IP traceback | |
Zhang et al. | Privacy-preserving traceable encrypted traffic inspection in blockchain-based industrial IoT | |
Dalai et al. | A novel approach for message authentication to prevent parameter tampering attack in web applications | |
Wu et al. | Constant‐Size Credential‐Based Packet Forwarding Verification in SDN | |
Jambha et al. | Securing Layers: The Synergy of Mix Networks and Shamir's Secret Sharing in Onion Routing | |
Ghosh | QUANTUM-RESISTANT SECURITY FRAMEWORK FOR SCADA COMMUNICATION IN INDUSTRIAL CONTROL SYSTEMS. | |
Ming-Hao | The security analysis and attacks detection of OSPF routing protocol |