Dynamic Routing and Agent Technology Based Security Enhanced Data Delivery with Public Key Cryptography
Abstract
Keywords
Full Text:
PDFReferences
Hopps, “Analysis of an equal-cost multi path algorithms,” RFC 2992, Nov. 2000.
Villamizar, “Ospf optimized multipath (ospf-omp),” draft-iet ospfomp-03, p. 46, June 1999.
G. Apostolopoulos,V. Peris,P.Pradhan,and D. saha , “Securing Electronic Commerce: Reducing the SSL Overhead,” IEEE Network, 2000.
S. Bohacek, J.P. Hespanha, K.Obraczka, J. Lee, and Lim, “Enhancing Security via Stochastic Routing,” Proc. 11th Int’l Conf. Computer Comm. and Networks (ICCCN), 2002.
T.H. Cormen, C.E. Leiserson, and R.L. Rivest, Introduction to Algorithms. MIT Press, 1990.
M. Faloutsos, P. Faloutsos, and C. Faloutsos,“On Power-Law Relationships of the Internet Topology,”Proc. ACM SIGCOMM’99, pp. 251-262, 1999. FreeS/WAN, http://www.freeswan.org, 2008.
I. Gojmerac, T. Ziegler, F. Ricciato, and P. Reichl, “Adaptive Multipath Routing for Dynamic Traffic Engineering,” Proc. IEEE Global Telecommunications Conf. (GLOBECOM), 2003.
C. Hopps, Analysis of an Equal-Cost Multi-Path Algorithm, Request for comments (RFC 2992), Nov. 2000.
C. Kaufman, R. Perlman, and M. Speciner, Network Security PRIVATE Communication in a PUBLIC World, second ed. Prentice Hall PTR, 2002.
J.F. Kurose and K.W. Ross, Computer Networking—A Top-Down Approach Featuring the Internet. Addison Wesley, 2003.
S.-H. Liu, Y.-F. Lu, C.-F. Kuo, A.-C. Pang, and W. Kuo, “The Performance Evaluation of a Dynamic Configuration Method over IPSEC,” Proc. 24th IEEE Real-Time Systems Symp.: Works in Progress Session (RTSS WIP), 2003.
W. Lou and Y. Fang, “A Multipath Routing Approach for Secure Data Delivery,” Proc. IEEE Military Comm. Conf. (MilCom), 2001.
W. Lou, W. Liu, and Y. Fang, “SPREAD: Improving Network Security by Multipath Routing,” Proc. IEEE Military Comm. Conf. (MilCom), 2003.
G. Malkin, Routing Information Protocol (RIP) Version 2 Carrying Additional Information, Request for comments (RFC 1723), Nov.1994.
Chin-Fu Kuo, Ai-Chun Pang and Sheng-Kun Chan,” Dynamic routing with security consideration” IEEE Network, 2009.
William Stallings ” Cryptography and Network Security”, Third Edition(Pearson publication)
C. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Proc. ACM SIGCOMM ’94, pp. 234-244, 1994.
Secure Sockets Layer (SSL), http://www.openssl.org/, 2008.
R.Thayer, N. Doraswamy, and R. Glenn, IP Security Document Roadmap, Request for comments (RFC 2411), Nov. 1998.
J. Yang and S. Papavassiliou, “Improving Network Security by Multipath Traffic Dispersion,” Proc. IEEE Military Comm. Conf. FreeS/WAN, http://www.freeswan.org, 2008.
D.L. Mills, DCN Local-Network Protocols, Request for comments (RFC 891), Dec. 1983
A. Kannammal , Ch.S.N. Iyengar “A Framework for Mobile Agent Security in Distributed Agent-Based E-Business Systems “
George kirov “Soft computing agents for dynamic routing “
Manal Abdullah, Helen Bakhsh “Agent-based Dynamic Routing System for MANETs’
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.