SeRViTR: A Framework for Trust and Policy Management for a Secure Internet and Its Proof-of-Concept Implementation

by Xuan Liu , Akira Wada , Tianyi Xing , Parikshit Juluri , Yasuhiro Sato , Shingo Ata , Dijiang Huang , Deep Medhi
Citations:2 - 2 self

Active Bibliography

2 Constructing virtual networking environment in a Geo-distributed Programmable Layer-2 Networking Environment (G-PLaNE – Tianyi Xing, Xuan Liu, Chun-jen Chung, Akira Wada, Shingo Ata, Dijiang Huang, Deep Medhi - 2012
483 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
410 A Proposal to add Explicit Congestion Notification (ECN) to IP – K. Ramakrishnan, S. Floyd - 1999
333 HMAC: Keyed-Hashing for Message Authentication – H. Krawczyk, M. Bellare, R. Canetti - 1997
190 An algebraic approach to IP traceback – Drew Dean, Matt Franklin, Adam Stubblefield - 2002
171 The Addition of Explicit Congestion Notification (ECN) to IP – K. K. Ramakrishnan, Sally Floyd, David Black, Group K. Ramakrishnan - 2001
3 Establishing secure virtual trust routing and provisioning domains for future Internet – Dijiang Huang, Shingo Ata, Deep Medhi - 2010
Reconfigurable Data Planes for Scalable Network Virtualization – Deepak Unnikrishnan, Ramakrishna Vadlamani, Yong Liao, Jérémie Crenne, Lixin Gao, Russell Tessier, Senior Member
93 Definitions of the differentiated service field (DS field – Kathleen Nichols, Steven Blake, Fred Baker, David L. Black - 1998