Securing the Network Routing Algorithms
Created by admin on Wed, 29/08/2012 - 14:08
Abstract:
In this technical paper we present a study of the various routing algorithms, which are in use presently. This study of present algorithms is limited to their general working and the various security problems, which they are unable to solve. Our main emphasis is on discussing a novel approach based on “Leap-Frog cryptographic signing protocol” and that how this novel approach deals the various security threats, which, its predecessors (using traditional public-key signature schemes) are unable to withstand.
Upload File:
Add new comment