Network architectures or network communication protocols for network security; Applying verification of the received information received data contents, e.g. message integrity
IDENTITY-AWARE SECURE NETWORK
#2FINGERPRINT-BASED NETWORK MAPPING OF CYBER-PHYSICAL ASSETS
#3AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORK
#4SYSTEM AND METHOD TO VERIFY TRUSTWORTHINESS OF AN IHS USING SYSTEM TIME
#5SYSTEM AND METHOD FOR DECENTRALISED, SCALABLE, AND SECURE CONSENSUS BETWEEN COOPERATING BLOCKCHAIN SYSTEMS
#6BLOCKCHAIN-BASED AUTHENTICATION SYSTEM AND METHOD
#7COMPUTER-IMPLEMENTED METHOD
#8SECURE BLOCKCHAIN-BASED CONSENSUS
#9IN-VEHICLE DEVICE, DETECTION DEVICE, TRANSMISSION CONTROL METHOD, AND DETECTION METHOD
#10METHOD FOR MANAGING A LOCAL LEDGER OF A NODE BELONGING TO A SET OF NODES CONTRIBUTING TO A DISTRIBUTED LEDGER
#11VERIFYING THE AUTHENTICITY OF INTERNET KEY EXCHANGE MESSAGES IN A VIRTUAL PRIVATE NETWORK
#12METHODS AND SYSTEMS FOR DETERMINING THE AUTHENTICITY OF AN IDENTITY DOCUMENT
#13INTERFACE FOR A CORE PROCESS CONTROL SYSTEM
#14DETECTING KERBEROS TICKET ATTACKS WITHIN A DOMAIN
#15SYSTEMS AND METHODS FOR RANDOM DIFFERENTIAL RELAY AND NETWORK CODING
#16Disabling Executable Instructions from a Network Message
#17SYSTEM AND METHOD FOR EVALUATING ONLINE DATA
#18MANAGEMENT OF COLLABORATIVE CONTENT ITEM MODIFICATION
#19METHODS AND APPARATUS FOR DETECTING A PRESENCE OF A MALICIOUS APPLICATION
#20VEHICLE COMMUNICATION APPARATUS, IN-VEHICLE NETWORK SYSTEM, AND VEHICLE COMMUNICATION METHOD
#21SYSTEM AND METHOD FOR VERIFYING A RESOURCE DISTRIBUTION DEVICE FROM A PLURALITY VIA SCANNING DYNAMIC DEVICE-SPECIFIC COMPUTER-READABLE INDICIA
#22AUTONOMOUS COMPUTE STORAGE DEVICE SIGNATURE/APPLICATION SYSTEM
#23PROTECTING DATA TRANSFER BETWEEN A SECURE APPLICATION AND NETWORKED DEVICES
#24METHOD AND SYSTEM FOR VIRTUAL MACHINE AWARE POLICY MANAGEMENT
#25DELIVERY OF AN ELECTRONIC MESSAGE USING A MACHINE LEARNING POLICY
#26System and Method For Controlling Time Dilation In Time-Sensitive Networks
#27CIPHER TEXT VALIDATION
#28JAILED ENVIRONMENT RESTRICTING PROGRAMMATIC ACCESS TO MULTI-TENANT DATA
#29ACCOUNT ASSOCIATION SYSTEMS AND METHODS
#30Method for Identifying a Manipulation of a Message of a Bus System by Means of a Control Device of a Vehicle, Computer-Readable Medium, System, and Vehicle
#31SECURE COMMUNICATION BETWEEN IN-VEHICLE ELECTRONIC CONTROL UNITS
#32SELF-SERVICE LENDER PORTAL
#33SECURING BROWSER COOKIES
#34PREVENTING MASQUERADING SERVICE ATTACKS
#35Validating Authenticity of Electronic Documents Shared via Computer Networks
#36PHISHING EMAIL CAMPAIGN IDENTIFICATION
#37Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure
#38THREAT DETECTION PLATFORMS FOR DETECTING, CHARACTERIZING, AND REMEDIATING EMAIL-BASED THREATS IN REAL TIME
#39SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES
#40METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR AUTHENTICATION AND AUTHORIZATION OF NETWORKED DATA TRANSACTIONS
#41FAST PROPAGATION OF RECENT TRANSACTIONS OVER A BLOCKCHAIN NETWORK
#42COMMUNICATION SYSTEM AND RECEIVING DEVICE
#43MULTI-CLOCK SYNCHRONIZATION IN POWER GRIDS
#44SYSTEM AND METHOD FOR SECURE DETOKENIZATION
#45FLEXIBLE CRYPTOGRAPHIC ARCHITECTURE IN A NETWORK DEVICE
#46SYSTEMS AND METHODS FOR VERIFYING A ROUTE TAKEN BY A COMMUNICATION
#47AUTONOMOUS COMPUTE STORAGE DEVICE SIGNATURE/APPLICATION SYSTEM
#48METHODS AND SYSTEMS FOR INTRODUCING SELF-CONTAINED INTENT FUNCTIONALITY INTO DECENTRALIZED COMPUTER NETWORKS
#49AUTHENTICATED HEALTH CREDENTIAL ACCESS METHODS AND APPARATUS
#50Command and Control Steganographic Communications Detection Engine
#51DISTRIBUTED PRIVATELY SUBSPACED BLOCKCHAIN DATA STRUCTURES WITH SECURE ACCESS RESTRICTION MANAGEMENT
#52TARGETED AUTHENTICATION QUERIES BASED ON DETECTED USER ACTIONS
#53METHOD AND APPARATUS FOR PACKET FORWARDING, NETWORK NODE AND STORAGE MEDIUM
#54SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE
#55SECURE OVER-THE-AIR UPDATES
#56REMOTE TRANSACTION VERIFICATION
#57SECURE MESSAGING FOR OUTAGE EVENTS
#58COMPUTER IMPLEMENTED SYSTEMS AND METHODS FOR PROVIDING A MULTIPURPOSE CONTROL AND NETWORKING PLATFORM
#59METHOD FOR SECURELY COMMUNICATING EMAIL CONTENT BETWEEN A SENDER AND A RECIPIENT
#60CONTROL PLANE BASED SECURITY PROVISIONING IN A NON-PUBLIC NETWORK
#61Method and system for activating telematics services
#62TECHNOLOGIES FOR MEMORY REPLAY PREVENTION USING COMPRESSIVE ENCRYPTION
#63CUSTOMIZED CODE BUNDLE TO ENABLE SECURE COMMUNICATION FROM INTERNET OF THINGS DEVICES AT WIRELESS NETWORKS
#64INCORPORATING NETWORK POLICIES IN KEY GENERATION
#65Dynamic Message Analysis Platform for Enhanced Enterprise Security
#66OMNI CHANNEL AUTHENTICATION
#67Method And Apparatus For A Secure Application Server
#68Detecting KERBEROS ticket attacks within a domain
#69SYSTEM AND APPARATUS FOR GEOGRAPHICALLY TARGETED FRAUDULENT ACCESS MAPPING AND AVOIDANCE
#70METHOD AND APPARATUS FOR PROVIDING STRONG MUTUAL AUTHENTICATION, ENCRYPTION, AND INTEGRITY FOR CONSTRAINT DEVICES WITHOUT SECURE STORAGE AND PKI SUPPORT
#71SECURING LENDER OUTPUT DATA
#72METHOD FOR GENERATING AN EVIDENCE OF THE TIME ELAPSED BETWEEN EVENTS IN AN ASYNCHRONOUS NODE NETWORK
#73SECURE WEB RTC REAL TIME COMMUNICATIONS SERVICE FOR AUDIO AND VIDEO STREAMING COMMUNICATIONS
#74Multi-factor message authentication
#75MALICIOUS UNIVERSAL RESOURCE LOCATOR AND FILE DETECTOR AND RESPONSE ACTION ENGINE
#76Digital jukebox device with improved karaoke-related user interfaces, and associated methods
#77SECURELY TRANSMITTING DATA IN A DATA STREAM
#78Electronic Mail Verification
#79SECURE COMMUNICATION TOOL FOR USE ALONGSIDE NON-SECURE COMMUNICATIONS
#80Internet packet provenance to verify packet validity and control packet usage
#81Electronic interaction authentication and verification, and related systems, devices, and methods
#82METHOD OF VERIFYING THE INTEGRITY OF AN APPLICATION IN A VEHICLE CONTROLLER
#83BLOCKCHAIN-BASED SHARED APPRECIATION NOTE
#84METHOD FOR OBTAINING FILE BASED ON OVER-THE-AIR OTA TECHNOLOGY AND RELATED DEVICE
#85ACCESSING DATA ON A BLOCKCHAIN WITH PROOF OF DATA VERIFICATION
#86Email Processing for Improved Authentication Question Accuracy
#87BIOMETRIC INTERACTION MANAGER
#88INTERFACE DATA TRANSMISSION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM
#89SYSTEMS AND METHODS OF SECURE PROVENANCE FOR DISTRIBUTED TRANSACTION DATABASES
#90CONTEXT-BASED SECURE CONTROLLER OPERATION AND MALWARE PREVENTION
#91MESSAGE SECURITY ASSESSMENT USING SENDER IDENTITY PROFILES
#92HORIZONTAL SCALING OF VIRTUAL NETWORK SECURITY FUNCTIONS
#93SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO A BLOCKCHAIN
#94SYSTEM AND METHOD FOR UPDATING A NON-PERSISTENT COLLECTOR DEPLOYED IN A COMPUTE ENVIRONMENT
#95SECURE NETWORK DEVICE MANAGEMENT IN A TELECOMMUNICATIONS NETWORK
#96PROTECTING DATA TRANSFER BETWEEN A SECURE APPLICATION AND NETWORKED DEVICES
#97Techniques for shared private data objects in a trusted execution environment
#98SYSTEM AND METHODS FOR PREDICTIVE CYBER-PHYSICAL RESOURCE MANAGEMENT
#99Method for synchronizing a plurality of communication servers, and corresponding computer devices and programs
#100METHOD FOR SECURELY COMMUNICATING EMAIL CONTENT BETWEEN A SENDER AND A RECIPIENT
#101Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
#102INFRASTRUCTURE LEVEL LAN SECURITY
#103METHOD FOR CONDUCTING A BIOPROCESS
#104DOMAIN NAME SYSTEM SECURITY EXTENSION (DNSSEC) FOR CONTAINER SIGNATURE MANAGEMENT
#105PROCESS LEVEL AUTHENTICATION FOR CLIENT DEVICE ACCESS TO A SERVER SYSTEM
#106System and method for ongoing trigger-based scanning of cyber-physical assets
#107Systems and methods of providing immutable records
#108Dynamic message analysis platform for enhanced enterprise security
#109METHOD AND SYSTEM FOR PROCESSING DATA PACKAGES
#110Method and reproduction unit for reproducing protected messages
#111REWARD POINT TRANSFERS USING BLOCKCHAIN
#112SYSTEMS AND METHODS FOR AUTHENTICATING PHOTOGRAPHIC IMAGE DATA
#113PLATFORM AND METHOD OF CERTIFICATION OF AN ELECTRONIC NOTICE FOR ELECTRONIC IDENTIFICATION AND TRUST SERVICES (EIDAS)
#114DISTRIBUTED ENCRYPTION
#115DELEGATION OF A NAMING IDENTIFIER RESOLUTION FUNCTION
#116BOOTSTRAPPING ROOT OF TRUST FOR FEDERATED BLOCKCHAINS
#117SELECTIVITY IN PRIVACY AND VERIFICATION WITH APPLICATIONS
#118COMMUNICATION DEVICE AND METHOD FOR APPLICATION LAYER-INDEPENDENT TRIGGERING OF EVENTS IN A COMMUNICATION NETWORK
#119Flexible format encryption
#120System and Method for Asset Management and Integration
#121DATA COMPRISING ENCRYPTION KEY
#122REDUNDANT TRANSMISSION OF A PROTECTED DIGITAL AND AN ANALOG MEASUREMENT SIGNAL
#123METHOD AND FIREWALL CONFIGURED TO MONITOR MESSAGES TRANSITING BETWEEN TWO COMMUNICATION ELEMENTS
#124SECURE SIGNED FILE UPLOAD
#125SYSTEM AND METHOD FOR PROVIDING API VERSION CONTROL
#126Methods and apparatus for presence monitoring
#127System and method for generating and monitoring dynamic identifiers for data processing security
#128Systems and methods for side-channel monitoring of a local network
#129System for sending e-mail and/or files securely
#130TIME-BASED DIGITAL SIGNATURE
#131AN APPARATUS INCLUDING A TRANSCEIVER
#132METHOD OF SECURING A VOTING TRANSACTION
#133QUANTUM-RESISTANT DOUBLE SIGNATURE SYSTEM
#134CO-MANAGING MANAGED RESOURCES WITH A REMOTE MANAGEMENT SYSTEM
#135ANOMALY DETECTION METHOD, ANOMALY DETECTION DEVICE, AND RECORDING MEDIUM
#136SELECTIVELY REPLICATED TRUSTLESS PERSISTENT STORE
#137Verification of in-situ network telemetry data in a packet-switched network
#138Searchable index encryption
#139SINGLE SIGN-ON THROUGH CUSTOMER AUTHENTICATION SYSTEMS
#140Method for secure data transmission and system using the same
#141APPARATUS INCLUDING A TRANSCEIVER
#142SYSTEM AND METHOD USING DISTRIBUTED BLOCKCHAIN DATABASE
#143ENCRYPTION KEY ROTATION FRAMEWORK
#144System and method for interfacing with a decisioning service from a third party domain
#145Network services in a mesh network
#146Optimized messaging in a mesh network
#147Methods for authenticating photographic image data
#148METHODS OF MANUFACTURING A GARMENT APPARATUS
#149Multi-clock synchronization in power grids
#150VERIFICATION METHOD, VERIFICATION APPARATUS, AND STORAGE MEDIUM INCLUDING PROGRAM STORED THEREIN
#151Method for improving data transmission security
#152System and method for determining a volatile file based on a selection factor
#153INTEGRATED SYSTEM AND INTEGRATED METHOD BETWEEN MULTI-CLOUD APPLICATIONS
#154STRENGTHENING INTEGRITY ASSURANCES FOR DNS DATA
#155Privacy Preserving Validation And Commit Architecture
#156Method and Apparatus for Critical Control Message Transfer Across Networks
#157DATA ANALYSIS METHOD AND APPARATUS
#158METHOD AND SYSTEM FOR DIGITAL IDENTITY AND TRANSACTION VERIFICATION
#159USER AUTHENTICATION AND DATA ENCRYPTION SYSTEMS AND METHODS
#160Method and system for HTTP session management using hash chains
#161METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MEASURING DATA INTEGRITY IN TIME SENSITIVE NETWORKS
#162Fast propagation of recent transactions over a blockchain network
#163Management of collaborative content item modification
#164Systems and methods for hybrid blockchain control
#165Method and apparatus for managing reception of secure data packets
#166SYSTEM AND METHODS FOR PREDICTIVE CYBER-PHYSICAL RESOURCE MANAGEMENT
#167Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
#168SECURE ELECTRONIC TOKENS IN AN ELECTRONIC TOKENING SYSTEM
#169System, Method, and Computer Program Product for Processing a Transaction as a Push Payment Transaction
#170Secure web RTC real time communications service for audio and video streaming communications
#171Secure streaming media based on updating hypercontent in a secure peer-to-peer data network
#172Document architecture with fragment-driven role-based access controls
#173Delivery of an electronic message using a machine learning policy
#174COMMUNICATION METHOD BASED ON DUAL CHANNELS AND RSSP-I, APPARATUS, ELECTRONIC DEVICE AND STORAGE MEDIUM
#175Device and Method for Sending a Message to at Least Two Receivers for a Motor Vehicle
#176Path validation checks for proof of security
#177Distributed Trust-Based Communication
#178Systems and methods of controlling internet access using encrypted DNS
#179Agentless system and method for discovering and inspecting applications and services in compute environments
#180PROVIDING EQUAL SIGNING AUTHORITY BETWEEN MULTIPLE DEVICES OF A SINGLE USER IN AN END-TO-END ENCRYPTED MESSAGING SYSTEM
#181SECURE APPLICATION FOR ACCESSING WEB RESOURCES
#182System, method and computer readable medium for determining users of an internet service
#183Authentication procedure in a virtual private network
#184Authentication procedure in a virtual private network
#185SYSTEM AND METHOD FOR MAINTAINING NETWORK SECURITY IN A MESH NETWORK BY ANALYZING IP STACK LAYER INFORMATION IN COMMUNICATIONS
#186MULTI-TENANT TWO-STAGE AUTHENTICATION
#187Authentication procedure in a virtual private network
#188Authentication procedure in a virtual private network
#189Secure transfer of workloads across security regions
#190Authentication procedure in a virtual private network
#191SYSTEM AND METHOD FOR DETECTING POTENTIAL INFORMATION FABRICATION ATTEMPTS ON A WEBPAGE
#192BLOCKCHAIN NETWORK SYSTEM
#193Context-based secure controller operation and malware prevention
#194SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR PROCESSING UNSOLICITED ELECTRONIC MAIL
#195EVENT VERIFICATION ENGINE
#196Method and apparatus for providing an adaptable security level in an electronic communication
#197Invoking an Automatic Process in a Web-Based Target System Using a Chat-Bot
#198ALGORITHM FOR SECURE COMMUNICATIONS USING SYMMETRIC KEYS
#199Secure enclave of UE route selection policy rules in the 5G device or network slicing
#200Digital jukebox device with improved karaoke-related user interfaces, and associated methods
#201One-Armed Inline Decryption/Encryption Proxy Operating in Transparent Bridge Mode
#202MULTI-FACTOR AUTHENTICATION OF CLOUD-MANAGED SERVICES
#203Secure blockchain-based consensus
#204Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
#205Detecting and mitigating golden ticket attacks within a domain
#206PLUGGABLE FIRMWARE UPDATE MODULES FOR DOWNLOAD ACCELERATION AND CUSTOMIZABLE SECURITY VALIDATION
#207SECURED EXECUTION CONTEXT DATA
#208Systems, Devices, and Methods for Secure Feature Selection
#209Aggregating audit records in a storage network
#210Socket Security and Authentication Device, System and Method
#211USER VERIFICATION SYSTEMS AND METHODS
#212Authenticating Access Configuration for Application Programming Interfaces
#213Sufficiently Secure Controller Area Network
#214Methods and systems for a digital trust architecture
#215Systems and methods for random differential relay and network coding
#216METHOD AND ELECTRONIC VEHICLE SYSTEM FOR PROCESSING V2X MESSAGES
#217ELECTRONIC DEVICE FOR TRANSMITTING AND/OR RECEIVING IDENTITY INFORMATION AND OPERATING METHOD THEREOF
#218System, Method And Computer Readable Medium For Message Authentication To Subscribers Of An Internet Service Provider
#219Command and control steganographic communications detection engine
#220Detecting man-in-the-middle attacks in adaptive streaming
#221Dynamic authentication scheme selection in computing systems
#222Fast propagation of recent transactions over a blockchain network
#223Systems and methods of secure provenance for distributed transaction databases
#224Methods, systems, and computer readable media for reducing the likelihood of successful denial of service (DoS) attacks by validating overload control information (OCI) scope against network function (NF) profile information obtained using target resource identification information
#225Preventing masquerading service attacks
#226Data Transmission Method and Apparatus
#227Speculative rendering
#228Distributed content uploading and validation
#229Systems, methods, apparatuses and computer program products for executing data verification operations between independent computing resources
#230NETWORK TIMING SYNCHRONIZATION
#231Securely verifying protected devices
#232Systems, methods, and computer program products for testing of cloud and onboard autonomous vehicle systems
#233DIGITAL VALUE TOKEN PROCESSING SYSTEMS AND METHODS HAVING IMPROVED SECURITY AND SCALABILITY
#234Resource provider account token provisioning and processing
#235TRAIL RECORDING SYSTEM AND DATA VERIFICATION METHOD
#236Stock rewards in consumer transactions
#237Distributed ledger-based ad-hoc system, apparatus and method using fingerprint verification
#238AUTHENTICATING TRANSACTIONS USING RISK SCORES DERIVED FROM DETAILED DEVICE INFORMATION
#239DETECTION DEVICE, VEHICLE, DETECTION METHOD, AND DETECTION PROGRAM
#240Network device and media access control address learning method therefor
#241Method and apparatus for improved security in trigger action platforms
#242FLEXIBLE AUTHENTICATION SERVICE FOR IOT DEVICES ACCOMMODATING NON-IP ENVIRONMENTS
#243Methods and systems for controlling a smart lock
#244DEVICE FOR PREVENTING AND BLOCKING POSTING OF HARMFUL CONTENT
#245MULTI-RECIPIENT SECURE COMMUNICATION
#246Infrastructure level LAN security
#247Smart edge co-processor
#248Communication method, system and device and computer-readable storage medium
#249Computer system architecture and application for intercommunications in divergent database management systems
#250Email processing for improved authentication question accuracy
#251Method and transmission device for data transmission between two or more networks
#252Machine learning techniques for object authentication
#253Secure transmission
#254Secure distributed information system for public device authentication
#255PROVISION OF DATA FROM A SERVICE PROVIDER NETWORK
#256AUTHENTICATED MESSAGING SESSION WITH CONTACTLESS CARD AUTHENTICATION
#257System and method for distributed, keyless electronic transactions with authentication
#258SECURE DATA CACHING FOR EDGE NETWORKS
#259Verification of in-situ network telemetry data in a packet-switched network
#260Securely provisioning a target device
#261System and method for malware detection using hashing techniques
#262Method for securely communicating email content between a sender and a recipient
#263Apparatus for electronic control of vehicle, apparatus for gateway and vehicle including the same
#264Storing decrypted body of message and key used to encrypt and decrypt body of message
#265Verification of data processes in a network of computing resources
#266Methods and apparatus for detecting a presence of a malicious application
#267SELECTION METHOD, SELECTION SYSTEM, AND RECORDING MEDIUM
#268Guidance authentication with vehicles
#269PASSWORDLESS LOGIN
#270SECURE ANALYSIS APPLICATION FOR ACCESSING WEB RESOURCES
#271METHOD FOR CREATING AN ELECTRONIC MESSAGE THE INTEGRITY OF WHICH IS GUARANTEED AND VERIFIABLE ACCORDING TO THE MIME STANDARD
#272System and Method of Establishing a Trusted Relationship in a Distributed System
#273System and method for providing API version control
#274System and method for interfacing with a decisioning service from a third party domain
#275System and method for digital imaging and communications in security standard compliance validation
#276Apparatus and method for security of internet of things device
#277VERIFYING AD REQUESTS
#278Hash contract generation and verification system
#279Systems and methods for authenticating photographic image data
#280PRIVACY KEY AND MESSAGE AUTHENTICATION CODE
#281EFFICIENT SENSOR DATA DELIVERY
#282System and method for asset management and integration
#283Resilient self-detection of malicious exfiltration of sensitive data
#284System and method for transferring data
#285Customized code bundle to enable secure communication from internet of things devices at wireless networks
#286CREDENTIAL-FREE USER LOGIN TO REMOTELY EXECUTED APPLICATIONS
#287Technologies for proving packet transit through uncompromised nodes
#288Distributed memory data repository based defense system
#289SECURING DISTRIBUTED ELECTRONIC WALLET SHARES
#290Real-time and secured picture/video upload via a content delivery network
#291BLOCKCHAIN-BASED MESSAGE PROCESSING METHOD AND APPARATUS, DEVICE, AND STORAGE MEDIUM
#292Systems and methods for generating and validating certified electronic credentials
#293Method for securely communicating email content between a sender and a recipient
#294Systems and methods for sensor trustworthiness
#295Command and control steganographic communications detection engine
#296VEHICLE COMMUNICATION METHOD, APPARATUS, STORAGE MEDIUM AND PROGRAM PRODUCT
#297Secure transfer using media access control security (MACsec) key agreement (MKA)
#298Secure message including a vehicle private key
#299Systems and methods for verifying a route taken by a communication
#300Securing an overlay network against attack