Explores BGP security weaknesses, real-world incidents, and defenses against BGP hijacking, emphasizing the importance of cryptography in securing routing information.
Explores the significance of naming and indirection in computer systems, emphasizing the use of names for flexibility, scalability, and fault tolerance.