-
2
-
-
36849047430
-
-
E. Billauer. Frandom. http://frandom.ssurceforge.net, 2007.
-
(2007)
Frandom
-
-
Billauer, E.1
-
3
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. CACM, 13(7):422-426, 1970.
-
(1970)
CACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
6
-
-
0034206002
-
Summary cache: A scalable wide-area web cache sharing protocol
-
L. Fan, P. Cao, J. Almeida, and A. Z. Broder. Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Trans. Netw., 8(3):281-293, 2000.
-
(2000)
IEEE/ACM Trans. Netw
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.Z.4
-
9
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy of interdomain routing
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy of interdomain routing. In Proc. NDSS, 2003.
-
(2003)
Proc. NDSS
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
13
-
-
0040291388
-
The Click modular router
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click modular router. ACM Trans. Comput. Syst., 18(3):263-297, 2000.
-
(2000)
ACM Trans. Comput. Syst
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
17
-
-
2342630172
-
Secure traceroute to detect faulty or malicious routing
-
V. Padmanabhan and D. Simon. Secure traceroute to detect faulty or malicious routing. SIGCOMM Comp. Comm. Review, 33(1):77-82, 2003.
-
(2003)
SIGCOMM Comp. Comm. Review
, vol.33
, Issue.1
, pp. 77-82
-
-
Padmanabhan, V.1
Simon, D.2
-
18
-
-
0032677326
-
End-to-end internet packet dynamics
-
V. Paxson. End-to-end internet packet dynamics. IEEE/ACM Trans. Netw., 7(3):277-292, 1999.
-
(1999)
IEEE/ACM Trans. Netw
, vol.7
, Issue.3
, pp. 277-292
-
-
Paxson, V.1
-
19
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. SIGCOMM Comp. Comm. Rev., 30(4):295-306, 2000.
-
(2000)
SIGCOMM Comp. Comm. Rev
, vol.30
, Issue.4
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
20
-
-
0036947597
-
Single-packet IP traceback
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer. Single-packet IP traceback. IEEE/ACM Trans. Netw., 10(6):721-734, 2002.
-
(2002)
IEEE/ACM Trans. Netw
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
21
-
-
0002054139
-
Providing guaranteed services without per-flow management
-
I. Stoica and H. Zhang. Providing guaranteed services without per-flow management. In Proc. SIGCOMM, 1999.
-
(1999)
Proc. SIGCOMM
-
-
Stoica, I.1
Zhang, H.2
-
22
-
-
83255186150
-
Listen and Whisper: Security mechanisms for BGP
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and Whisper: Security mechanisms for BGP. In Proc. NSDI, 2004.
-
(2004)
Proc. NSDI
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.5
|