A Protocol for Forwarding Route Establishment and Packet

Cached

Download Links

by Across Multidomain Internets , Deborah Estrin , Martha Steenstrup , Gene Tsudik

Active Bibliography

Network Working Group D. Estrin Request for Comments: 1322 USC Y. Rekhter IBM S. Hotz USC May 1992 A Unified Approach to Inter-Domain Routing – Status Of This, Y. Rekhter, S. Hotz
6 Remote Network Monitoring MIB Protocol Identifier Macros", RFC 2896, August 2000. 8. IANA Considerations The protocols identified in this specification are almost entirely defined in external documents. In some rare cases, an arbitrary Protocol Identifier – A. Bierman, C. Bucci, R. Iddon
39 KryptoKnight Authentication and Key Distribution System – Refik Molva, Gene Tsudik, Els van Herreweghen, Stefano Zatti - 1993
Network Working Group R. Braden Request for Comments: 1337 ISI May 1992 TIME-WAIT Assassination Hazards in TCP – Status Of This
Requirements for Internet Gateways Status of this Memo – R. Braden, J. Postel - 1987
365 Measurements and analysis of end-to-end Internet dynamics – Vern Paxson - 1997
3 Privacy-Enhanced Electronic Mail – Matt Bishop - 1992
22 Distributed, Scalable Routing Based on Link-State Vectors – Jochen Behrens, J.J. Garcia-Luna-Aceves - 1994
24 A New Approach to Multicast Communication in a Datagram Internetwork – Anthony Ballardie - 1995
Status of this Memo A Unified Approach to Inter-Domain Routing – D. Estrin, Y. Rekhter, S. Hotz - 1992
2 Secure and Minimal Protocols for Authenticated Key Distribution – Philippe Janson, Gene Tsudik - 1995
5 On Simple and Secure Key Distribution – Gene Tsudik, Els Van Herreweghen - 1993
9 Authentication Method with Impersonal Token Cards – Refik Molva, Gene Tsudik - 1993
Network Working Group F. Baker, Editor Request for Comments: 1812 Cisco Systems Obsoletes: 1716, 1009 June 1995 Category: Standards Track – Requirements For Ip
2 Differentiated Services: Architecture, Mechanisms and an Evaluation – Wenjia Fang - 2000
Network Working Group F. Baker, Editor Request for Comments: 1812 – Cisco Systems - 1716
4 A look back at “security problems in the TCP/IP protocol suite РSteven M. Bellovin
119 The SecureRing Protocols for Securing Group Communication – Kim Potter Kihlstrom, L. E. Moser, P. M. Melliar-smith - 1998
55 Efficient Protocols for Signing Routing Messages – Kan Zhang - 1998