Open Access
Issue
MATEC Web of Conferences
Volume 56, 2016
2016 8th International Conference on Computer and Automation Engineering (ICCAE 2016)
Article Number 01006
Number of page(s) 5
Section Computer and Information technologies
DOI https://doi.org/10.1051/matecconf/20165601006
Published online 26 April 2016
  1. Information on: https:/wiki.onosproject.org [Google Scholar]
  2. Information on: http://thesecretlivesofdata.com/raft/ [Google Scholar]
  3. Information on: https://wiki.onosproject.org/display/ONOS/Network+Topology+State#NetworkTopologyState-FailureHandlingandAnti-Entropy [Google Scholar]
  4. Dierks T, Rescorla E. The Transport Layer Security (TLS) Protocol. Version 1.1. In: E R, editor. (2006) [Google Scholar]
  5. Information on: http://www.ntu.edu.sg/home/ehchua/programming/webprogramming/HTTP_SSL.html [Google Scholar]
  6. Haojun Z, Xiaoxue L, Rui R. A Novel Self-Renewal Hash Chain and Its Implementation. 2008 IEEE/IFIP InterNational Conference on Embedded and Ubiquitous Computing. Shanghai, p.144–149 (2008) [Google Scholar]
  7. Xiao-Yuan Y, Jia-Yong C, Jing-Jing W. A Self-Renewal Hash Chain Scheme Based on Fair Exchange Idea(SRHC-FEI). 3rd IEEE International Conference on Computer Science and Information Technology. Sichuan, p.152–156 (2010) [Google Scholar]
  8. Alabrah A, Bassiouni M. A Hierarchical Two-Tier One-way Hash Chain Protocol for Secure Internet Transactions. Anaheim, CA, p.868–873 (2012) [Google Scholar]
  9. Jun-Huy L, Sang-Gon L, Hoon-Jae L, Eko OY. Securing Distributed SDN with IBC. ICUFN 2015. Sapporo, p.921–925 (2015) [Google Scholar]
  10. Santos MAS, Nunes BAA, Obraczka K, Turletti T, de Oliveira and Cintia B. Margi BT. Decentralizing SDN’s Control Plane. 39th Annual IEEE Conference on Local Computer Networks. Edmonton, AB, p.402–405(2014) [Google Scholar]
  11. PAULSON LC. Inductive Analysis of the Internet Protocol TLS. ACM Transactions on Information and System Security. 2, 3, p.332–351(1999) [CrossRef] [Google Scholar]
  12. Apostolopoulos G, Peris V, Saha D. Transport Layer Security: How much does it really cost. INFOCOM ‘99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. New York, p.717–725(1999) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.