Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,798,721 papers from all fields of science
Search
Sign In
Create Free Account
Route distinguisher
Known as:
Network address prefix
, Prefix (disambiguation)
, RD
Expand
A route distinguisher is an address qualifier used only within a single internet service provider's Multiprotocol Label Switching (MPLS) network. It…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Border Gateway Protocol
Multiprotocol Label Switching
Virtual private network
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A second pre-image attack and a collision attack to cryptographic hash function lux
S. Fatih
,
Koçak
2017
Corpus ID: 63942883
Cryptography is a science that provides the security of information in communication. One of the most important sub-branches of…
Expand
2014
2014
XLS is Not a Strong Pseudorandom Permutation
M. Nandi
International Conference on the Theory and…
2014
Corpus ID: 9331680
In FSE 2007, Ristenpart and Rogaway had described a generic method XLS to construct a length-preserving strong pseudorandom…
Expand
2013
2013
On Provably Secure Code-based Signature and Signcryption Scheme
Noen Given
2013
Corpus ID: 7065620
Signcryption is a cryptographic protocol that provides authentication and confidentiality as a single primitive at a cost lower…
Expand
2010
2010
PERCEPTIVE APPROACH FOR ROUTE OPTIMIZATION IN MOBILE IP
Sumit Kumar
,
Anil Kumar
2010
Corpus ID: 10689659
The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for…
Expand
2010
2010
A Practical-Time Attack on the KASUMI Cryptosystem Used in GSM and 3 G Telephony
O. Dunkelman
,
Nathan Keller
,
A. Shamir
2010
Corpus ID: 15500075
The privacy of most GSM phone conversations is currently protected by the 20+ years old A5/1 and A5/2 stream ciphers, which were…
Expand
2009
2009
Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers
G. Bard
,
S. Ault
,
N. Courtois
Cryptologia
2009
Corpus ID: 15483389
Abstract It has been stated many times that a block cipher is “intended to be” computationally indistinguishable from a random…
Expand
2006
2006
Advantages of Node Energy Control for Routes Selection in Wireless Sensor Networks
R. Gomes
,
E. Souto
,
J. Kelner
,
D. Sadok
IEEE International Conference on Networking…
2006
Corpus ID: 3194063
Wireless sensor networks are characterized for being composed for a large number of nodes that are distributed geographically in…
Expand
2006
2006
Distinguishing Attack on SOBER-128 with Linear Masking
J. Cho
,
J. Pieprzyk
Australasian Conference on Information Security…
2006
Corpus ID: 15433522
We present a distinguishing attack against SOBER-128 with linear masking. We found a linear approximation which has a bias of 2…
Expand
Highly Cited
2000
Highly Cited
2000
Improving quality-of-service in ad hoc wireless networks with adaptive multi-path routing
Sajal K. Das
,
A. Mukherjee
,
S. Bandyopadhyay
,
K. Paul
,
Debashis Saha
Global Communications Conference
2000
Corpus ID: 7367186
The objective of this paper is to propose a mechanism for adaptive computation of multiple paths to transmit a large volume of…
Expand
Highly Cited
1992
Highly Cited
1992
The zookeeper route problem
W. Chin
,
S. Ntafos
Information Sciences
1992
Corpus ID: 13533535
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE