An efficient cryptographic approach for secure policy based routing: (TACIT Encryption Technique)
暂无分享,去创建一个
Ashwani Sharma | Ajit Singh | Nikhil Pahwa | Frosanta Crope | Ajit Singh | Frosanta Crope | Ashwani Sharma | Nikhil Pahwa
[1] Prosanta Gope,et al. MULTI OPERATOR DELIMITER BASED DATA ENCRYPTION STANDARD (MODDES) , 2009 .
[2] Prosanta Gope,et al. X-MODDES (eXtended Multi Operator Delimiter Based Data Encryption Standard) , 2010, 2010 Second International Conference on Future Networks.
[3] Daniel O. Awduche,et al. Requirements for Traffic Engineering Over MPLS , 1999, RFC.
[4] It Informatics,et al. Border Gateway Protocol , 2013 .
[5] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[6] Ossama Younis,et al. Constraint-based routing in the internet: Basic principles and recent research , 2003, IEEE Communications Surveys & Tutorials.
[7] Susan Hares,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[8] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[9] Prosanta Gope,et al. A COMPARATIVE STUDY OF PERFORMANCE BASED CRYPTO ANALYSIS FEATURES FOR STANDARD DATA ENCRYPTION ALGORITHMS WITH (MODDES) , 2009 .
[10] Eric S. Crawley,et al. A Framework for QoS-based Routing in the Internet , 1998, RFC.
[11] David D. Clark,et al. Policy routing in Internet protocols , 1989, RFC.
[12] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.