Are We There Yet? On RPKI's Deployment and Security.
Yossi GiladAvichai CohenAmir HerzbergMichael SchapiraHaya ShulmanPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- information security
- security issues
- intrusion detection
- access control
- network security
- security systems
- security model
- statistical databases
- security analysis
- security requirements
- information assurance
- high security
- security management
- computer security
- databases
- computer systems
- decision making
- encryption scheme
- data security
- elliptic curve
- security policies
- wireless networks
- security threats
- website