Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Raphael M. Reischuk"'
Publikováno v:
IEEE/ACM Transactions on Networking. 27:2028-2042
The lack of transparency for Internet communication prevents effective mitigation of today’s security threats: i) Source addresses cannot be trusted and enable untraceable reflection attacks. ii) Malicious communication is opaque to all network ent
Publikováno v:
Communications of the ACM. 60:56-65
Adhering to the end-to-end principle even more than the current Internet yields highly available point-to-point communication.
Autor:
Pawel Szalachowski, Stephanos Matsumoto, Raphael M. Reischuk, Adrian Perrig, Tiffany Hyun-Jin Kim
Publikováno v:
ACM Transactions on Privacy and Security. 20:1-34
In this article, we address the problem of scaling authentication for naming, routing, and end-entity (EE) certification to a global environment in which authentication policies and users’ sets of trust roots vary widely. The current mechanisms for
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust inf
Publikováno v:
IEEE Symposium on Security and Privacy
Despite a great deal of work to improve the TLS PKI, CA misbehavior continues to occur, resulting in unauthorized certificates that can be used to mount man-in-the-middle attacks against HTTPS sites. CAs lack the incentives to invest in higher securi
Publikováno v:
Information Security and Cryptography ISBN: 9783319670799
How can the deployment of SCION be initiated? Which ISDs exist in the beginning? How can an ISP or end domain start using SCION and what benefits are obtained? This chapter discusses deployment and operation aspects of SCION and provides answers to t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e0c7537742f65a54926daae938ddec6c
https://doi.org/10.1007/978-3-319-67080-5_10
https://doi.org/10.1007/978-3-319-67080-5_10
Publikováno v:
Information Security and Cryptography ISBN: 9783319670799
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5cd218dfa3677fa4efa284125a86739b
https://doi.org/10.1007/978-3-319-67080-5_7
https://doi.org/10.1007/978-3-319-67080-5_7
Publikováno v:
Information Security and Cryptography ISBN: 9783319670799
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::57dd21afaa52d6cf984f65b775c38bbd
https://doi.org/10.1007/978-3-319-67080-5_17
https://doi.org/10.1007/978-3-319-67080-5_17
Publikováno v:
Information Security and Cryptography ISBN: 9783319670799
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5e5fe90859c885031d8bb8454709c058
https://doi.org/10.1007/978-3-319-67080-5_5
https://doi.org/10.1007/978-3-319-67080-5_5
Publikováno v:
Information Security and Cryptography ISBN: 9783319670799
This chapter describes the details of SCION configuration files. All SCION configuration files are represented in JSON [42] format.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::deb75eaeccebe2365cbcb67cd395863c
https://doi.org/10.1007/978-3-319-67080-5_16
https://doi.org/10.1007/978-3-319-67080-5_16