Using resource public key infrastructure for secure border gateway protocol.
George ChangMajid ArianezhadLjiljana TrajkovicPublished in: CCECE (2016)
Keyphrases
- public key infrastructure
- digital signature
- public key cryptography
- security mechanisms
- public key
- application development
- key technologies
- smart card
- resource constraints
- information exchange
- elliptic curve
- resource management
- security policies
- security issues
- security model
- border gateway protocol
- security services
- digital watermarking
- key management
- watermarking scheme
- routing protocol
- access control
- low cost
- end users
- data streams