Authenticated adversarial routing
DOI10.1007/S00145-013-9157-6zbMATH Open1319.68015arXiv0808.0156OpenAlexW1755465830MaRDI QIDQ484328FDOQ484328
Authors: Yair Amir, Paul Bunn, Rafail Ostrovsky
Publication date: 7 January 2015
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/0808.0156
Recommendations
communication complexityfault localizationnetwork routingend-to-end communicationerror-correctionmulti-party computation
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Reliability, testing and fault tolerance of networks and computer systems (68M15) Network design and communication in computer systems (68M10) Distributed systems (68M14) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cites Work
- Foundations of Cryptography
- On-line/off-line digital signatures
- Title not available (Why is that?)
- Coding for interactive communication
- Log-Space Polynomial End-to-End Communication
- Adaptive packet routing for bursty adversarial traffic
- Improved approximation algorithms for the multi-commodity flow problem and local competitive routing in dynamic networks
- A coding theorem for distributed computation
- Slide—The Key to Polynomial End-to-End Communication
- Asynchronous throughput-optimal routing in malicious networks
- The slide mechanism with applications in dynamic networks (extended abstract)
- Protocols and Lower Bounds for Failure Localization in the Internet
- Theory of Cryptography
Cited In (4)
This page was built for publication: Authenticated adversarial routing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q484328)