Abstract
The protocols, data, and algorithms that compute paths through interconnected
network devices are possibly the most vital, complex, and fragile
components in the global information infrastructure. They are also
the least protected. This article examines the current state of,
and practical prospects for, security in IP routing infrastructures
Users
Please
log in to take part in the discussion (add own reviews or comments).