-
1
-
-
76749131194
-
LANES: An inter- domain data-oriented routing architecture
-
Dec.
-
K. Visala, D. Lagutin, and S. Tarkoma, "LANES: An Inter- Domain Data-Oriented Routing Architecture," in ReArch'09, Dec. 2009.
-
(2009)
ReArch'09
-
-
Visala, K.1
Lagutin, D.2
Tarkoma, S.3
-
2
-
-
76749083002
-
Networking named content
-
V. Jacobson, D. K. Smetters, J. D. Thornton, M. Plass, N. Briggs, and R. L. Braynard, "Networking named content," in Proceedings of ACM CoNEXT 2009, 2009.
-
(2009)
Proceedings of ACM CoNEXT
, vol.2009
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
Plass, M.4
Briggs, N.5
Braynard, R.L.6
-
3
-
-
36949039907
-
A data-oriented (and beyond) network architecture
-
Kyoto, Japan, Aug.
-
T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica, "A data-oriented (and beyond) network architecture," in Proceedings of ACM SIGCOMM 2007, Kyoto, Japan, Aug. 2007.
-
(2007)
Proceedings of ACM SIGCOMM 2007
-
-
Koponen, T.1
Chawla, M.2
Chun, B.-G.3
Ermolinskiy, A.4
Kim, K.H.5
Shenker, S.6
Stoica, I.7
-
4
-
-
84929315070
-
Security issues and requirements for Internet-scale publish-subscribe systems
-
Hawaii, USA
-
C. Wang, A. Carzaniga, D. Evans, and A. L. Wolf, "Security issues and requirements for Internet-scale publish-subscribe systems," in Proceedings of the 35th annual Hawaii international conference on system sciences (HICSS'02), Hawaii, USA, 2002.
-
(2002)
Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)
-
-
Wang, C.1
Carzaniga, A.2
Evans, D.3
Wolf, A.L.4
-
5
-
-
2442586702
-
Canon in G major: Designing DHTs with hierarchical structure
-
P. Ganesan, K. Gummadi, and H. Garcia-Molina, "Canon in G Major: Designing DHTs with Hierarchical Structure," in ICDCS'04. IEEE Computer Society, 2004, pp. 263-272.
-
(2004)
ICDCS'04. IEEE Computer Society
, pp. 263-272
-
-
Ganesan, P.1
Gummadi, K.2
Garcia-Molina, H.3
-
7
-
-
33751508709
-
-
National Institute of Standards and Technology, Tech. Rep., Mar.
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "Recommendation for key management - part 1: General, nist special publication 800-57," National Institute of Standards and Technology, Tech. Rep., Mar. 2009.
-
(2009)
Recommendation for Key Management - Part 1: General, Nist Special Publication 800-57
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
8
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," ACM Communications, vol.13, no.7, pp. 422-426, 1970.
-
(1970)
ACM Communications
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
9
-
-
70350459309
-
-
Licentiate's Thesis in Computer Science, Helsinki University of Technology, Espoo, Finland
-
D. Lagutin, "Redesigning internet - the packet level authentication architecture," Licentiate's Thesis in Computer Science, Helsinki University of Technology, Espoo, Finland, 2008.
-
(2008)
Redesigning Internet - The Packet Level Authentication Architecture
-
-
Lagutin, D.1
-
10
-
-
70350445019
-
-
Helsinki University of Technology,Tech. Rep. [Online]. Available:
-
J. Forsten, K. Järvinen, and J. Skyttä, "Packet level authentication: Hardware subtask final report," Helsinki University of Technology,Tech. Rep., 2008. [Online]. Available:http://www.tcs.hut.fi/Software/ PLA/new/doc/PLA HW final report.pdf
-
(2008)
Packet Level Authentication: Hardware Subtask Final Report
-
-
Forsten, J.1
Järvinen, K.2
Skyttä, J.3
-
11
-
-
77956498086
-
-
Network Working Group, Tech. Rep., May. [Online]. Available:
-
R. Rivest, "S-Expressions (draft-rivest-sexp-00.txt)," Network Working Group, Tech. Rep., May 1997. [Online]. Available:http://people.csail. mit.edu/rivest/Sexp.txt
-
(1997)
S-Expressions (draft-rivest-sexp-00.txt)
-
-
Rivest, R.1
-
12
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, "Secure routing for structured peer-to-peer overlay networks," SIGOPS Oper. Syst. Rev., vol.36, pp. 299-314, 2002.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
13
-
-
84947273682
-
The sybil attack
-
Lecture Notes in Computer Science. London, UK: Springer-Verlag
-
J. R. Douceur, "The Sybil Attack," in IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, ser. Lecture Notes in Computer Science, vol.2429. London, UK: Springer-Verlag, 2002, pp. 251-260.
-
(2002)
IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
15
-
-
0003858844
-
-
UC Berkeley, Tech. Rep., Apr.
-
B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph, "Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing," UC Berkeley, Tech. Rep., Apr. 2001.
-
(2001)
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing
-
-
Zhao, B.Y.1
Kubiatowicz, J.D.2
Joseph, A.D.3
-
16
-
-
74549116447
-
LIPSIN: Line speed publish/subscribe internetworking
-
Barcelona, Spain, Aug.
-
P. Jokela, A. Zahemszky, C. Esteve, S. Arianfar, and P. Nikander, "LIPSIN: Line speed publish/subscribe internetworking," in Proceedings of ACM SIGCOMM 2009, Barcelona, Spain, Aug. 2009.
-
(2009)
Proceedings of ACM SIGCOMM 2009
-
-
Jokela, P.1
Zahemszky, A.2
Esteve, C.3
Arianfar, S.4
Nikander, P.5
-
17
-
-
77954925208
-
Self-routing denial-of-service resistant capabilities using in-packet bloom filters
-
C. Esteve, P. Jokela, P. Nikander, M. Srel, and J. Ylitalo, "Self-routing Denial-of-Service Resistant Capabilities using In-packet Bloom Filters," Proceedings of European Conference on Computer Network Defence (EC2ND), 2009.
-
(2009)
Proceedings of European Conference on Computer Network Defence (EC2ND)
-
-
Esteve, C.1
Jokela, P.2
Nikander, P.3
Srel, M.4
Ylitalo, J.5
-
18
-
-
65249188655
-
Accountable internet protocol (AIP)
-
Seattle, USA: ACM
-
D. G. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker, "Accountable internet protocol (AIP)," in Proceedings of the ACM SIGCOMM 2008. Seattle, USA: ACM, 2007, pp. 339-350.
-
(2007)
Proceedings of the ACM SIGCOMM 2008
, pp. 339-350
-
-
Andersen, D.G.1
Balakrishnan, H.2
Feamster, N.3
Koponen, T.4
Moon, D.5
Shenker, S.6
-
19
-
-
77956535056
-
-
[Online]. Available:
-
"Netfpga," 2009. [Online]. Available: http://www.netfpga.org/
-
(2009)
-
-
-
21
-
-
0003455038
-
-
Ph.D. dissertation, Department of Electrical Engineering, Stanford University
-
R. Merkle, "Secrecy, authentication, and public key systems." Ph.D. dissertation, Department of Electrical Engineering, Stanford University, 1979.
-
(1979)
Secrecy, Authentication, and Public Key Systems.
-
-
Merkle, R.1
-
22
-
-
0242426103
-
The tesla broadcast authentication protocol
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The tesla broadcast authentication protocol," Cryptobytes, vol.5, no.2, pp. 2-13, 2002.
-
(2002)
Cryptobytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
23
-
-
70350755765
-
Alpha: An adaptive and lightweight protocol for hopbyhop authentication
-
T. Heer, S. Gtz, O. G. Morchon, and K. Wehrle, "Alpha: An adaptive and lightweight protocol for hopbyhop authentication," in Proceedings of ACM CoNEXT 2008, 2008.
-
(2008)
Proceedings of ACM CoNEXT 2008
-
-
Heer, T.1
Gtz, S.2
Morchon, O.G.3
Wehrle, K.4
-
24
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
Springer
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proceedings of CRYPTO, vol.84. Springer, 1984, pp. 47-53.
-
(1984)
Proceedings of CRYPTO
, vol.84
, pp. 47-53
-
-
Shamir, A.1
|