Back to Results
First PageMeta Content
Internet / Computer networking / Routing / Internet protocols / Routing table / Router / Border Gateway Protocol / Forwarding information base / Path vector protocol / Network architecture / Routing protocols / Computing


Securing Data Through Avoidance Routing Erik Kline Peter Reiher Laboratory for Advanced Systems Research
Add to Reading List

Document Date: 2010-05-07 12:30:59


Open Document

File Size: 146,37 KB

Share Result on Facebook

City

Configuring Policy / Oxford / Constraint / Los Angeles / /

Company

Ad Hoc Networks / John Wiley and Sons Inc. / Distributed Computing Systems / Peer-To-Peer Systems / Robust Overlay Networks / Cisco Inc. / Service Overlay Networks / MacMillan / Resilient Self-Organizing Overlay Networks / Avoidance Routing Erik Kline Peter Reiher Laboratory / Deploying Crypto Software / Distance Vector Networks / Mobile Ad Hoc Networks / Wireless Ad Hoc Networks / IEEE Journal / BBC News / Akamai / /

Country

Estonia / France / United Kingdom / Germany / Sweden / Belgium / Russia / United States / Georgia / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Securing Data Through Avoidance Routing Erik Kline Peter Reiher Laboratory / /

IndustryTerm

heuristic-based depth-first search / search fails / wireless routing / Internet routing paths / Internet AS-level Structure / cross-border internet traffic / search table entries / Wireless Communications / generic overlay network / last still-connected router / anonymity-type overlay network / software capabilities / search table / few Internet routers / depth-first search / search entry / Internet Protocol / autonomous systems / anonymity network / heavyweight search operation / Internet routing AS / search table entry / search space / individual router / table entry search / search optimization / Internet routers / link state routing protocol / search data / search complexity / search loops / possible solutions / search algorithm / routing protocol / wireless networks / recent search / return failure search / Internet topology knowledge present / possible solution / Internet Computing / search messages / advertisement search / route processor / route processors / Internet Map Discovery / overlay network / false search message / /

MarketIndex

next / /

OperatingSystem

DoS / /

Organization

Benefit China Navy Research Center / US Department of Justice / Center for Strategic and International Studies / Russian government / Securing Data Through Avoidance Routing Erik Kline Peter Reiher Laboratory / Data Through Avoidance Routing Erik Kline Peter Reiher Laboratory / British intelligence / Advanced Systems Research UCLA Computer Science Department / /

/

Position

General / forward / Protocols General / 44th President / /

Product

IPv4 / Mobile / /

ProvinceOrState

California / /

Technology

Secure Border Gateway Protocol / Internet routers / search algorithm / relatively few Internet routers / last still-connected router / BGP routers / one router / Quality of Service / route processor / encryption / cryptography / Dynamic Source Routing Protocol / previous router / Security-Aware Routing Protocol / link state routing protocol / criteria Algorithm / cache The search algorithm / Wireless Communications / GPS / P2P / individual router / CSR-16RP route processor / routing protocol / route processors / Internet Protocol / Mobile Computing / http / participating routers / Caching / IPv4 / 3.3 Router Overhead Router / /

URL

http /

SocialTag