Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Applications》 2003-12
Add to Favorite Get Latest Update

A Cheap and Reliable Mechanism for OSPF Verification

XIE Di, YANG Jing(School of Computer Science and Technology, Shandong University, Jinan Shandong 250061, China)  
In order to guarantee the security of OSPF protocol and to reduce its cost as much as possible, a new verification mechanism was proposed. This mechanism utilized symmetric cryptosystems, public cryptosystems and hash chains etc. to highly improve the verification efficiency, and adopted timestamp and one-time authentication to sufficiently assure the verification process. Furthermore, the performance and the cost of the verification mechanism were discussed.'
【Fund】: 山东省自然科学基金项目 (Y2 0 0 0C2 6 )
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 HE Qiu-shi (Qingdao Hismile College,Qiagdao 266100,China);Digital Signature Protection of OSPF Based on LSU[J];Journal of Sichuan Vocational and Technical College;2008-02
2 LI Chang-Shan1,QIAN Zhi-jun2,YANG You-hong2(1.Information Center,Daqing Petro Ministration Bureau,Daqing 163453,China; 2.School of Computer and Information Engineering,Daqing Petroleum Institute,Daqing 163453,China);Research on security of OSPF routing protocol with digital signature protection[J];Journal of Harbin University of Commerce(Natural Sciences Edition);2007-04
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Chun_qing,ZHANG Hong_ke (School of Electronics and Information Engineering, Northern Jiaotong University, Beijing 100044,China);Routing Calculation of OSPF Dynamic Routing Protocol[J];Journal of Northern Jiaotong University;2003-03
2 SHI Chuang-ming(Department of Computer and Science, AnYang Teacher's College, Anyang 455000,China);The Principles of OSPF Protocol and OSPF Vulnerability Management[J];Computer Knowledge and Technology;2005-32
3 LIU Kui-xing, WANG Bin-qiang, JIA Juan (National Digital Switching System Research Center, Zhengzhou 450002, China);Research and Analysis on OSPF Routing Protocol Security[J];Video Engineering;2007-02
4 QU Ying-wei, ZHENG Guang-hai (School of Computer Science,Dalian University of Communication, Dalian 116028, China);Study on architecture of security based on multi-Agent systems[J];Journal of Harbin University of Commerce(Sciences Edition);2005-02
5 LI Chang-Shan1,QIAN Zhi-jun2,YANG You-hong2(1.Information Center,Daqing Petro Ministration Bureau,Daqing 163453,China; 2.School of Computer and Information Engineering,Daqing Petroleum Institute,Daqing 163453,China);Research on security of OSPF routing protocol with digital signature protection[J];Journal of Harbin University of Commerce(Natural Sciences Edition);2007-04
6 MU Chunyan (School of Software,Hangzhou Institute of Electronic Engineering, Hangzhou Zhejiang 310037,China);Implementation Algorithm of OSPF Protocol[J];Journal of Hangzhou Institute of Electronic Engineering;2003-01
7 YOU Lantao,ZHU Qiaoming,LI Peifeng(School of Computer Science & Technology,Soochow University,Suzhou 215006);Design of Fast Discovery System of Network Topology Based on OSPF[J];Computer Engineering;2006-24
8 WANG Hui, LUO Jun-yong, KOU Xiao-rui (College of Information Engineering, PLA Information Engineering University, Zhengzhou 450002);Network Topology Algorithm Based on OSPF Protocol Packet[J];Computer Engineering;2008-06
9 Xu Dahai,Huang Jianqiang,Wu Kexi and Bai Yingcai(Department of Computer Science & Engineering,Shanghai Jiaotong University);OSPF-Based Network Topology Search[J];COMPUTER ENGINEERING & SCIENCE;1999-06
10 SHAO Bing,LI Yuepeng,ZHAO Baohua(Department of Computer Science and Technology,University of Science and Technology of China,Hefei Anhui 230027,China);Research and Practice of OSPF Protocol Performance Test[J];Computer Applications;2003-10
【Secondary References】
Chinese Journal Full-text Database 5 Hits
1 CAI Zhao-quan (Network Center, Huizhou University, Huizhou 516015, China);OSPF routing protocol attacks analysis and security precaution[J];Computer Engineering and Design;2007-23
2 LI Zhao-bin1,HAN Ting2,CHI Ya-ping1,FANG Yong1(1.Department of Communication,Beijing Electronic Science and Technology Institute,Beijing 100070,China; 2.School of Computer Science and Technology,Xidian University,Xi'an 710071,China);Study of OSPF based on trusted computing[J];Computer Engineering and Design;2011-09
3 ZHANG Yang-yang;LIU Dan-dan;School of Information and Engineering,Hebei University of Science and Technology;;Analysis of Vulnerability Attacks Based on OSPF Protocol[J];Telecom Power Technology;2015-01
4 TAO Zhi-Yong1,2,WANG Ru-Long1,ZHANG Jin1 1(Information Center of Changsha Social Work College,Changsha 410004,China) 2(Software College,Software School of Hunan University,Changsha 410082,China);Communication Method Based on Multi-process Among Areas[J];Computer Systems & Applications;2013-04
5 Zhou Xuan;Wang Yongjie;Qin Zhibo;Network Department,Hefei Electronic Engineering Institute;Information Department,Naval Command College;;OSPF Routing Vulnerability Mechanism and Prevention Measures[J];Command Information System and Technology;2015-05
China Proceedings of conference Full-text Database 2 Hits
1 CUI Yin1,ZHENG Kangfeng2 (1.Beijing University of Posts and Telecommunications Information Security Center,Beijing 100876,China;2.Beijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery,Beijing 100876,China);The Security Features Analysis and Improvement for OSPF Protocol[A];[C];2011
2 Fan Shuangjiao;Hu Ying;Lu Tianliang;Zhao Kang;Information Security Center,Beijing University of Posts and Telecommunications;Armed Police Beijing Command Academy;School of Network Security Safeguard,People's Public Security University of China;;Real-time Network Topology Discovery Algorithm Based on OSPF[A];[C];2014
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved