A Survey of BGP Security

http://www.patrickmcdaniel.org/pubs/td-5ugj33.pdf



A Survey of BGP Security Issues and Solutions


http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5357585&abstractAccess=no&userType=inst





psu.edu 中的 [PDF]A Perrig, R Canetti, JD Tygar… - RSA CryptoBytes, 2002 - Citeseer
One of the main challenges of securing broad- cast communication is source authentication,
or enabling receivers of broadcast data to verify that the received data really originates from the
claimed source and was not modified en route. This problem is complicated by mutually ... 

Thursday, 17 March 2011

Ordered identity-based multisignature

What I need

Ref. ccs07 Ordered Multisignature and identity-based sequential aggregate signature with applications to secure routing

Ref. PKC06 Identity-Based Aggregate Signature

A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks



http://www.springerlink.com/content/t47864p23w232662/

Tuesday, 15 March 2011

Paring implementation

Compact hardware for computing the Tate
pairing over 128-bit-security supersingular
curves

http://eprint.iacr.org/2010/371.pdf

Friday, 11 March 2011

Certificate-Based Sequential Aggregate Signature

http://portal.acm.org/citation.cfm?doid=1514274.1514278



Identity-Based Aggregate Signatures

http://www.springerlink.com/content/t58889563g2137pw/



Efficient sequential aggregate signed data  


Eurocrypt08
Author:Gregory NevenDepartment of Electrical Engineering, Katholieke Universiteit Leuven, Heverlee-Leuven, Belgium


http://portal.acm.org/citation.cfm?id=1788418

http://www.zurich.ibm.com/~nev/papers/sasd.html

Thursday, 10 March 2011

Path authentication

Aggregated path authentication for efficient BGP security  CCS05


http://portal.acm.org/citation.cfm?id=1102139



Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing   CCS 07


http://portal.acm.org/citation.cfm?id=1315245.1315280

ID-BASED SEQUENTIAL AGGREGATE
SIGNATURES

Proxy Re-Signatures

Proxy Re-Signatures: New Definitions, Algorithms, and
Applications