-
2
-
-
0029217787
-
I-TCP: Indirect TCP for Mobile Hosts
-
A. Bakre and B. Badrinath. I-TCP: Indirect TCP for Mobile Hosts. In Proc. IEEE ICDCS, pages 136-143, 1995.
-
(1995)
Proc. IEEE ICDCS
, pp. 136-143
-
-
Bakre, A.1
Badrinath, B.2
-
3
-
-
0029457516
-
Improving TCP/IP Performance over Wireless Networks
-
H. Balakrishnan, S. Seshan, E. Amir, and R. Katz. Improving TCP/IP Performance over Wireless Networks. In Proc. ACM MOBICOM, pages 2-11, 1995.
-
(1995)
Proc. ACM MOBICOM
, pp. 2-11
-
-
Balakrishnan, H.1
Seshan, S.2
Amir, E.3
Katz, R.4
-
4
-
-
84962298068
-
-
draft-bittau-tcp-crypt-00.txt, July
-
A. Bittau, D. Boneh, M. Hamburg, M. Handley, D. Mazieres, and Q. Slack. Cryptographic protection of TCP Streams (tcpcrypt). draft-bittau-tcp-crypt-00. txt, July 2010.
-
(2010)
Cryptographic Protection of TCP Streams (Tcpcrypt)
-
-
Bittau, A.1
Boneh, D.2
Hamburg, M.3
Handley, M.4
Mazieres, D.5
Slack, Q.6
-
5
-
-
84889709075
-
The case for ubiquitous transport-level encryption
-
A. Bittau, M. Hamburg, M. Handley, D. Mazieres, and D. Boneh. The case for ubiquitous transport-level encryption. In Proc. USENIX Security Symposium, Aug 2010.
-
Proc. USENIX Security Symposium, Aug 2010
-
-
Bittau, A.1
Hamburg, M.2
Handley, M.3
Mazieres, D.4
Boneh, D.5
-
6
-
-
0012726551
-
Middleboxes: Taxonomy and Issues
-
Feb.
-
B. Carpenter and S. Brim. Middleboxes: Taxonomy and Issues. RFC 3234, Feb. 2002.
-
(2002)
RFC
, vol.3234
-
-
Carpenter, B.1
Brim, S.2
-
7
-
-
0041932202
-
Flow Aggregation for Enhanced TCP over Wide-Area Wireless
-
R. Chakravorty, S. Katti, J. Crowcroft, and I. Pratt. Flow Aggregation for Enhanced TCP over Wide-Area Wireless. In Proc. IEEE INFOCOM, pages 1754-1764, 2003.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1754-1764
-
-
Chakravorty, R.1
Katti, S.2
Crowcroft, J.3
Pratt, I.4
-
10
-
-
77956035216
-
-
Tech. Rep. UCB/EECS- 2005-24
-
R. Fonseca, G. Porter, R. Katz, S. Shenker, and I. Stoica. IP options are not an option. Tech. Rep. UCB/EECS- 2005-24, 2005.
-
(2005)
IP Options Are Not An Option
-
-
Fonseca, R.1
Porter, G.2
Katz, R.3
Shenker, S.4
Stoica, I.5
-
11
-
-
79961026723
-
Architectural guidelines for multipath TCP development
-
Mar.
-
A. Ford, C. Raiciu, M. Handley, S. Barre, and J. Iyengar. Architectural guidelines for multipath TCP development. RFC 6182, Mar. 2011.
-
(2011)
RFC
, vol.6182
-
-
Ford, A.1
Raiciu, C.2
Handley, M.3
Barre, S.4
Iyengar, J.5
-
13
-
-
85019224720
-
Peer-to-Peer Communication Across Network Address Translators
-
B. Ford, P. Srisuresh, and D. Kegel. Peer-to-Peer Communication Across Network Address Translators. USENIX ATC, 2005.
-
(2005)
USENIX ATC
-
-
Ford, B.1
Srisuresh, P.2
Kegel, D.3
-
14
-
-
82955238690
-
On the Implementation of the TCP Urgent Mechanism
-
Jan.
-
F. Gont and A. Yourtchenko. On the Implementation of the TCP Urgent Mechanism. RFC 6093, Jan. 2011.
-
(2011)
RFC
, vol.6093
-
-
Gont, F.1
Yourtchenko, A.2
-
15
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. In Proc. USENIX Security Symposium, 2001.
-
Proc. USENIX Security Symposium, 2001
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
16
-
-
78650870713
-
An Experimental Study of Home Gateway
-
S. Hätönen, A. Nyrhinen, L. Eggert, S. Strowes, P. Sarolahti, and M. Kojo. An Experimental Study of Home Gateway. ACM IMC, pages 260-266, 2010.
-
(2010)
ACM IMC
, pp. 260-266
-
-
Hätönen, S.1
Nyrhinen, A.2
Eggert, L.3
Strowes, S.4
Sarolahti, P.5
Kojo, M.6
-
17
-
-
0003234343
-
TCP Extensions for High Performance
-
May
-
V. Jacobson, R. Braden, and D. Borman. TCP Extensions for High Performance. RFC 1323, May. 1992.
-
(1992)
RFC
, vol.1323
-
-
Jacobson, V.1
Braden, R.2
Borman, D.3
-
18
-
-
0003334301
-
Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations
-
Jun.
-
J.Border, M. Kojo, J. Griner, G. Montenegro, and Z. Shelby. Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations. RFC 3135, Jun. 2001.
-
(2001)
RFC
, vol.3135
-
-
Border, J.1
Kojo, M.2
Griner, J.3
Montenegro, G.4
Shelby, Z.5
-
21
-
-
33645785842
-
Measuring the Evolution of Transport Protocols in the Internet
-
A. Medina, M. Allman, and S. Floyd. Measuring the Evolution of Transport Protocols in the Internet. ACM CCR, 35(2):37-52, 2005.
-
(2005)
ACM CCR
, vol.35
, Issue.2
, pp. 37-52
-
-
Medina, A.1
Allman, M.2
Floyd, S.3
-
22
-
-
0003213193
-
IP Network Address Translator (NAT) Terminology and Considerations
-
Aug.
-
P. Srisuresh and M. Holdrege. IP Network Address Translator (NAT) Terminology and Considerations. RFC 2663, Aug. 1999.
-
(1999)
RFC
, vol.2663
-
-
Srisuresh, P.1
Holdrege, M.2
-
23
-
-
0034781944
-
On Inferring TCP Behavior
-
Oct.
-
J. Padhye and S. Floyd. On Inferring TCP Behavior. In ACM SIGCOMM, pages 287-298, Oct. 2001.
-
(2001)
ACM SIGCOMM
, pp. 287-298
-
-
Padhye, J.1
Floyd, S.2
-
24
-
-
0030609303
-
End-to-End Internet Packet Dynamics
-
V. Paxson. End-to-End Internet Packet Dynamics. In Proc. ACM SIGCOMM, pages 139-152, 1997.
-
(1997)
Proc. ACM SIGCOMM
, pp. 139-152
-
-
Paxson, V.1
-
26
-
-
0002098557
-
Sting: A TCP-based Network Measurement Tool
-
S. Savage. Sting: a TCP-based Network Measurement Tool. In USENIX USITS, 1999.
-
(1999)
USENIX USITS
-
-
Savage, S.1
-
27
-
-
0002098559
-
TCP congestion control with a misbehaving receiver
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson. TCP Congestion Control with a Misbehaving Receiver. ACM CCR, 29(5):71-78, 1999. (Pubitemid 129500497)
-
(1999)
Computer Communication Review
, vol.29
, Issue.5
, pp. 71-78
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
28
-
-
4444294890
-
Stream Control Transmission Protocol (SCTP) Partial Reliability Extension
-
May
-
R. Stewart, M. Ramalho, and et al. Stream Control Transmission Protocol (SCTP) Partial Reliability Extension. RFC 3758, May. 2004.
-
(2004)
RFC
, vol.3758
-
-
Stewart, R.1
Ramalho, M.2
-
29
-
-
2442501519
-
Protocol Scrubbing: Network Security Through Transparent Flow Modification
-
D. Watson, M. Smart, G. R. Malan, and F. Jahanian. Protocol Scrubbing: Network Security Through Transparent Flow Modification. IEEE/ACM ToN, 12(2):261-273, 2004.
-
(2004)
IEEE/ACM ToN
, vol.12
, Issue.2
, pp. 261-273
-
-
Watson, D.1
Smart, M.2
Malan, G.R.3
Jahanian, F.4
-
30
-
-
85034112136
-
Design, implementation and evaluation of congestion control for multipath TCP
-
D. Wischik, C. Raiciu, A. Greenhalgh, and M. Handley. Design, implementation and evaluation of congestion control for multipath TCP. In Proc. USENIX NSDI, 2011.
-
Proc. USENIX NSDI, 2011
-
-
Wischik, D.1
Raiciu, C.2
Greenhalgh, A.3
Handley, M.4
|