Today's Internet is built on decades-old networking protocols that lack scalability, reliability and security. In response, the networking community has developed path-aware Internet architectures that solve these issues while simultaneously empowering end hosts. In these architectures autonomous systems authorize forwarding paths in accordance with their routing policies, and protect paths using cryptographic authenticators. For each packet, the sending end host selects an authorized paths and embeds it and its authenticators in the header. This allows routers to efficiently determine how to forward the packet. The central security property of the data plane, i.e., of forwarding, is that packets can only travel along authorized paths. This...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
Abstract. The Internet, as it stands today, is highly vulnerable to at-tacks. However, little has be...
International audienceMany cryptographic protocols aim at ensuring the route validity in ad-hoc netw...
The Internet infrastructure, as it stands today, is highly vulnerable to attacks. The Internet runs ...
A secure routing infrastructure is vital for secure and reliable Inter-net services. Source authenti...
As our economy and critical infrastructure increasingly rely on the Internet, securing routing proto...
As our economy and critical infrastructure increasingly rely on the Internet, securing routing proto...
Abstract—Capabilities-based networks present a fundamental shift in the security design of network a...
The world is becoming strongly dependent on computers, and on distributed communication between comp...
In response to high-profile Internet outages, BGP security variants have been proposed to prevent th...
In-network source authentication and path validation are funda-mental primitives to construct higher...
In recent years, there have been strong interests in the networking community in designing new Inter...
In recent years, there have been strong interests in the networking community in designing new Inter...
Attacks against Internet routing are increasing in number and severity. Contributing greatly to thes...
The way in which addressing and forwarding are implemented in the Internet constitutes one of its bi...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
Abstract. The Internet, as it stands today, is highly vulnerable to at-tacks. However, little has be...
International audienceMany cryptographic protocols aim at ensuring the route validity in ad-hoc netw...
The Internet infrastructure, as it stands today, is highly vulnerable to attacks. The Internet runs ...
A secure routing infrastructure is vital for secure and reliable Inter-net services. Source authenti...
As our economy and critical infrastructure increasingly rely on the Internet, securing routing proto...
As our economy and critical infrastructure increasingly rely on the Internet, securing routing proto...
Abstract—Capabilities-based networks present a fundamental shift in the security design of network a...
The world is becoming strongly dependent on computers, and on distributed communication between comp...
In response to high-profile Internet outages, BGP security variants have been proposed to prevent th...
In-network source authentication and path validation are funda-mental primitives to construct higher...
In recent years, there have been strong interests in the networking community in designing new Inter...
In recent years, there have been strong interests in the networking community in designing new Inter...
Attacks against Internet routing are increasing in number and severity. Contributing greatly to thes...
The way in which addressing and forwarding are implemented in the Internet constitutes one of its bi...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
Abstract. The Internet, as it stands today, is highly vulnerable to at-tacks. However, little has be...
International audienceMany cryptographic protocols aim at ensuring the route validity in ad-hoc netw...