Securing the Network Routing Algorithms

Created by admin on Wed, 29/08/2012 - 14:08
Abstract: 
In this technical paper we present a study of the various routing algorithms, which are in use presently. This study of present algorithms is limited to their general working and the various security problems, which they are unable to solve. Our main emphasis is on discussing a novel approach based on “Leap-Frog cryptographic signing protocol” and that how this novel approach deals the various security threats, which, its predecessors (using traditional public-key signature schemes) are unable to withstand.
Star Rating (Five): 

Add new comment

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.