User menu

Towards securing internet eXchange points against curious onlooKers

Bibliographic reference Chiesa, Marco ; Demmler, D. ; Canini, M. ; Schapira, M. ; Schneider, T.. Towards securing internet eXchange points against curious onlooKers.Applied Networking Research Workshop (Berlin, Germany, 16 July 2016).
Permanent URL
  1. A. C. Yao. How to Generate and Exchange Secrets. InFOCS'86.
  2. P. Richter, G. Smaragdakis, A. Feldmann, N. Chatzis, J. Boettger, and W. Willinger. Peering at Peerings: On the Role of IXP Route Servers. InIMC'14.
  3. Z. M. Mao, R. Bush, T. Griffin, and M. Roughan. BGP Beacons. InIMC'03.
  4. S. Machiraju and R. H. Katz. Reconciling Cooperation with Confidentiality in Multi-Provider Distributed Systems. Technical report, EECS Department, University of California, Berkeley, Aug 2004.
  5. C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian. Delayed Internet Routing Convergence. InSIGCOMM'00.
  6. D. Gupta, A. Segal, A. Panda, G. Segev, M. Schapira, J. Feigenbaum, J. Rexford, and S. Shenker. A new approach to interdomain routing based on secure multi-party computation. InHotNets'12.
  7. A. Gupta, R. MacDavid, R. Birkner, M. Canini, N. Feamster, J. Rexford, and L. Vanbever†. An Industrial-Scale Software Defined Internet Exchange Point. InNSDI'16.
  8. O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. InSTOC'87.
  9. D. Demmler, T. Schneider, and M. Zohner. ABY – A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. InNDSS'15.
  10. Ager Bernhard, Chatzis Nikolaos, Feldmann Anja, Sarrar Nadi, Uhlig Steve, Willinger Walter, Anatomy of a large european IXP, 10.1145/2342356.2342393
  11. Real-Time-Statistics AMS-IX.