-
2
-
-
84955557456
-
Hiding Routing Information
-
R. Anderson. Hiding Routing Information. Information Hiding, 1174:137-150, 1996.
-
(1996)
Information Hiding
, vol.1174
, pp. 137-150
-
-
Anderson, R.1
-
6
-
-
1242332540
-
Making Gnutella-like P2P Systems Scalable
-
Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker. Making Gnutella-like P2P Systems Scalable. In Applications, Technologies, Architectures, and Protocols for Computer Communications, 2003.
-
(2003)
Applications, Technologies, Architectures, and Protocols for Computer Communications
-
-
Chawathe, Y.1
Ratnasamy, S.2
Breslau, L.3
Lanham, N.4
Shenker, S.5
-
8
-
-
0036184272
-
Protecting Freedom of Information Online with Freenet
-
January-February
-
I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley. Protecting Freedom of Information Online with Freenet. IEEE Internet Computing, 6(1):40-49, January-February 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.1
, pp. 40-49
-
-
Clarke, I.1
Hong, T.W.2
Miller, S.G.3
Sandberg, O.4
Wiley, B.5
-
10
-
-
85084163781
-
Lessons Learned in Implementing and Deploying Crypto Software
-
P. Gutman. Lessons Learned in Implementing and Deploying Crypto Software. In Usenix Security Symposium, 2002.
-
Usenix Security Symposium, 2002
-
-
Gutman, P.1
-
17
-
-
34748852577
-
BASE: An Incrementally Deployable Mechanism for Viable IP Spoofing Prevention
-
H. Lee, M. Kwon, G. Hasker, and A. Perrig. BASE: An Incrementally Deployable Mechanism for Viable IP Spoofing Prevention. In ASIAN ACM Symposium on Information, Computer and Communications Security, 2007.
-
ASIAN ACM Symposium on Information, Computer and Communications Security, 2007
-
-
Lee, H.1
Kwon, M.2
Hasker, G.3
Perrig, A.4
-
19
-
-
0742269305
-
Resilient Self-Organizing Overlay Networks for Security Update Delivery
-
January
-
J. Li, G. Popek, and P. Reiher. Resilient Self-Organizing Overlay Networks for Security Update Delivery. IEEE Journal on Selected Areas in Communications, Special Issue on Service Overlay Networks, 22(1), January 2004.
-
(2004)
IEEE Journal on Selected Areas in Communications, Special Issue on Service Overlay Networks
, vol.22
, Issue.1
-
-
Li, J.1
Popek, G.2
Reiher, P.3
-
23
-
-
77950913903
-
-
Chinese National Sentenced For Committing Economic Espionage With the Intent to Benefit China Navy Research Center. June
-
US Department of Justice memo. Chinese National Sentenced For Committing Economic Espionage With the Intent to Benefit China Navy Research Center. http://www.cybercrime.gov/mengSent.pdf, June 2008.
-
(2008)
US Department of Justice Memo
-
-
-
25
-
-
77249170737
-
The (in)Completeness of the Observed Internet AS-level Structure
-
R. Oliveira, D. Pei, W. Willinger, B. Zhang, and L. Zhang. the (in)Completeness of the Observed Internet AS-level Structure. In IEEE/ACM Transactions on Networking, 2010.
-
(2010)
IEEE/ACM Transactions on Networking
-
-
Oliveira, R.1
Pei, D.2
Willinger, W.3
Zhang, B.4
Zhang, L.5
-
28
-
-
49249121544
-
Network Neutrality versus Network Trustworthiness?
-
July-August
-
F. Schneider. Network Neutrality versus Network Trustworthiness? IEEE Security and Privacy, 6(4), July-August 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.4
-
-
Schneider, F.1
-
29
-
-
0003487308
-
-
John Wiley and Sons, Inc.
-
B. Schneier. Secrets and Lies, pages 34-35. John Wiley and Sons, Inc., 2000.
-
(2000)
Secrets and Lies
, pp. 34-35
-
-
Schneier, B.1
-
32
-
-
77950889535
-
Depth First Search and Location Based Localized Routing and QoS Routing in Wireless Networks
-
I. Stojmenovic, M. Russel, and B. Vukojevic. Depth First Search and Location Based Localized Routing and QoS Routing in Wireless Networks. In Computers and Informatics, 2000.
-
(2000)
Computers and Informatics
-
-
Stojmenovic, I.1
Russel, M.2
Vukojevic, B.3
-
37
-
-
2942683989
-
Constraint-Based Routing in the Internet: Basic Principles and Recent Research
-
O. Younis and S. Fahmy. Constraint-Based Routing in the Internet: Basic Principles and Recent Research. In IEEE Communications Surveys and Tutorial, 2003.
-
(2003)
IEEE Communications Surveys and Tutorial
-
-
Younis, O.1
Fahmy, S.2
-
38
-
-
34548335245
-
Navigation in Distance Vector Spaces and Its Use for Node Avoidance Routing
-
H. Zlatokrilov and H. Levy. Navigation in Distance Vector Spaces and Its Use for Node Avoidance Routing. In IEEE Infocom 2007, 2007.
-
(2007)
IEEE Infocom 2007
-
-
Zlatokrilov, H.1
Levy, H.2
-
39
-
-
51449106275
-
Area Avoidance Routing in Distance Vector Networks
-
H. Zlatokrilov and H. Levy. Area Avoidance Routing in Distance Vector Networks. In IEEE Infocom 2008, 2008.
-
(2008)
IEEE Infocom 2008
-
-
Zlatokrilov, H.1
Levy, H.2
-
40
-
-
77950909381
-
-
Akamai. http://www.akamai.com, 2008.
-
(2008)
Akamai
-
-
-
41
-
-
77950885303
-
-
June 19
-
BBC News. Sweden approves wiretapping law. http://news.bbc.co.uk/2/hi/ europe/7463333.stm, June 19 2008.
-
(2008)
Sweden Approves Wiretapping Law
-
-
-
42
-
-
77950891908
-
-
Cisco, Inc. http://www.cisco.com/en/US/prod/collateral/routers/ ps5763/ps5862/product data sheet09186a008022d5f3.html, 2008.
-
(2008)
-
-
-
43
-
-
77950877634
-
-
Configuring Policy-Based Routing. http://www.cisco.com/en/US/ docs/ios/12 0/qos/configuration/guide/qcpolicy.html, 2008.
-
(2008)
Configuring Policy-Based Routing
-
-
-
44
-
-
33847090792
-
-
Gnutella. http://www.gnutella.com, 2008.
-
(2008)
Gnutella
-
-
-
45
-
-
77950900436
-
-
Source Address Spoofing. http://technet.microsoft.com/enus/ library/cc723706.aspx, 2008.
-
(2008)
Source Address Spoofing
-
-
-
46
-
-
77950899445
-
-
Tor. http://www.torproject.org, 2008.
-
(2008)
Tor
-
-
|