-
3
-
-
79955422471
-
Privacy-preserving network forensics
-
June
-
M Afanasyev, T Kohno, J Ma, N Murphy, S Savage, A C Snoeren, and G M Voelker Privacy-preserving network forensics Communications of the ACM, June 2011.
-
(2011)
Communications of the ACM
-
-
Afanasyev, M.1
Kohno, T.2
Ma, J.3
Murphy, N.4
Savage, S.5
Snoeren, A.C.6
Voelker, G.M.7
-
4
-
-
58049195641
-
Accountable Internet Protocol (AIP)
-
D G Andersen, H Balakrishnan, N Feamster, T Koponen, D Moon, and S Shenker Accountable Internet Protocol (AIP) In Proc SIGCOMM, 2008.
-
(2008)
Proc SIGCOMM
-
-
Andersen, D.G.1
Balakrishnan, H.2
Feamster, N.3
Koponen, T.4
Moon, D.5
Shenker, S.6
-
7
-
-
18144414892
-
A layered naming architecture for the Internet
-
H Balakrishnan, K Lakshminarayanan, S Ratnasamy, S Shenker, I Stoica, and M Walfish A layered naming architecture for the Internet In Proc SIGCOMM, 2004.
-
(2004)
Proc SIGCOMM
-
-
Balakrishnan, H.1
Lakshminarayanan, K.2
Ratnasamy, S.3
Shenker, S.4
Stoica, I.5
Walfish, M.6
-
9
-
-
0142244048
-
INS/Twine: A scalable peer-to-peer architecture for intentional resource discovery
-
M Balazinska, H Balakrishnan, and D R Karger INS/Twine: A scalable peer-to-peer architecture for intentional resource discovery In Proc Pervasive, 2002.
-
(2002)
Proc Pervasive
-
-
Balazinska, M.1
Balakrishnan, H.2
Karger, D.R.3
-
12
-
-
0038289995
-
A block-cipher mode of operation for parallelizable message authentication
-
J Black and P Rogaway A block-cipher mode of operation for parallelizable message authentication In Proc EUROCRYPT, 2002.
-
(2002)
Proc EUROCRYPT
-
-
Black, J.1
Rogaway, P.2
-
14
-
-
84967701397
-
The design philosophy of the DARPA internet protocols
-
D Clark The Design Philosophy of the DARPA Internet Protocols In Proc SIGCOMM, 1998.
-
(1998)
Proc SIGCOMM
-
-
Clark, D.1
-
17
-
-
1642309816
-
Plutarch: An argument for network pluralism
-
J Crowcroft, S Hand, R Mortier, T Roscoe, and A Warfield Plutarch: An Argument for Network Pluralism In Proc SIGCOMM FDNA, 2003.
-
(2003)
Proc SIGCOMM FDNA
-
-
Crowcroft, J.1
Hand, S.2
Mortier, R.3
Roscoe, T.4
Warfield, A.5
-
18
-
-
72249104877
-
RouteBricks: Exploiting parallelism to scale software routers
-
M Dobrescu, N Egi, K Argyraki, B.-G Chun, K Fall, G Iannaccone, A Knies, M Manesh, and S Ratnasamy RouteBricks: Exploiting Parallelism to Scale Software Routers In Proc SOSP, 2009.
-
(2009)
Proc SOSP
-
-
Dobrescu, M.1
Egi, N.2
Argyraki, K.3
Chun, B.-G.4
Fall, K.5
Iannaccone, G.6
Knies, A.7
Manesh, M.8
Ratnasamy, S.9
-
19
-
-
79952042736
-
Efficient cross-layer negotiation
-
B Ford and J Iyengar Efficient Cross-Layer Negotiation In Proc HotNets, 2009.
-
(2009)
Proc HotNets
-
-
Ford, B.1
Iyengar, J.2
-
20
-
-
80052993462
-
Service-centric networking with SCAFFOLD
-
Princeton Computer Science Department, September
-
M J Freedman, M Arye, P Gopalan, S Y Ko, E Nordstrom, J Rexford, and D Shue Service-centric networking with SCAFFOLD Technical Report TR-885-10, Princeton Computer Science Department, September 2010.
-
(2010)
Technical Report TR-885-820
-
-
Freedman, M.J.1
Arye, M.2
Gopalan, P.3
Ko, S.Y.4
Nordstrom, E.5
Rexford, J.6
Shue, D.7
-
23
-
-
76749083002
-
Networking named content
-
V Jacobson, D K Smetters, J D Thornton, M F Plass, N H Briggs, and R L Braynard Networking Named Content In Proc CoNEXT, 2009.
-
(2009)
Proc CoNEXT
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
Plass, M.F.4
Briggs, N.H.5
Braynard, R.L.6
-
24
-
-
36949039907
-
A data-oriented (and beyond) network architecture
-
T Koponen, M Chawla, B.-G Chun, A Ermolinskiy, K H Kim, S Shenker, and I Stoica A Data-Oriented (and Beyond) Network Architecture In Proc SIGCOMM, 2007.
-
(2007)
Proc SIGCOMM
-
-
Koponen, T.1
Chawla, M.2
Chun, B.-G.3
Ermolinskiy, A.4
Kim, K.H.5
Shenker, S.6
Stoica, I.7
-
27
-
-
66249102841
-
To filter or to authorize: Network-layer DoS defense against multimillion-node botnets
-
X Liu, X Yang, and Y Lu To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets In Proc SIGCOMM, 2008.
-
(2008)
Proc SIGCOMM
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
28
-
-
36949036429
-
Portcullis: Protecting connection setup from denial-of-capability attacks
-
B Parno, D Wendlandt, E Shi, A Perrig, B Maggs, and Y Hu Portcullis: Protecting connection setup from denial-of-capability attacks In Proc SIGCOMM, 2007.
-
(2007)
Proc SIGCOMM
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Hu, Y.6
-
29
-
-
0001300585
-
Plan 9 from bell labs
-
R Pike, D Presotto, S Dorward, B Flandrena, K Thompson, H Trickey, and P Winterbottom Plan 9 from bell labs Computing systems, 8(3):221-254, 1995.
-
(1995)
Computing Systems
, vol.8
, Issue.3
, pp. 221-254
-
-
Pike, R.1
Presotto, D.2
Dorward, S.3
Flandrena, B.4
Thompson, K.5
Trickey, H.6
Winterbottom, P.7
-
30
-
-
85047764379
-
Rule-based forwarding (RBF): Improving the Internet's flexibility and security
-
L Popa, I Stoica, and S Ratnasamy Rule-based forwarding (RBF): Improving the Internet's flexibility and security In Proc HotNets, 2009.
-
(2009)
Proc HotNets
-
-
Popa, L.1
Stoica, I.2
Ratnasamy, S.3
-
33
-
-
84872956176
-
Future internet architecture: Clean-slate versus evolutionary research
-
September
-
J Rexford and C Dovrolis Future internet architecture: clean-slate versus evolutionary research Communications of the ACM, September 2010.
-
(2010)
Communications of the ACM
-
-
Rexford, J.1
Dovrolis, C.2
-
34
-
-
84976845043
-
End-to-end arguments in system design
-
J H Saltzer, D P Reed, and D D Clark End-to-end Arguments in System Design ACM Transactions on Computer Systems, 2(4):277-288, 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
35
-
-
84864221374
-
A policy framework for the future internet
-
A Seehra, J Naous, M Walfish, D Mazieres, A Nicolosi, and S Shenker A Policy Framework for the Future Internet In Proc HotNets, 2009.
-
(2009)
Proc HotNets
-
-
Seehra, A.1
Naous, J.2
Walfish, M.3
Mazieres, D.4
Nicolosi, A.5
Shenker, S.6
-
36
-
-
84907331613
-
Leveraging good intentions to reduce unwanted network traffic
-
M Shaw Leveraging Good Intentions to Reduce Unwanted Network Traffic In Proc SRUTI, 2006.
-
(2006)
Proc SRUTI
-
-
Shaw, M.1
-
37
-
-
36949037234
-
Haggle: Clean-slate networking for mobile devices
-
University of Cambridge, Computer Laboratory, January
-
J Su, J Scott, P Hui, E Upton, M H Lim, C Diot, J Crowcroft, A Goel, and E de Lara Haggle: Clean-slate Networking for Mobile Devices Technical Report UCAM-CL-TR-680, University of Cambridge, Computer Laboratory, January 2007.
-
(2007)
Technical Report UCAM-CL-TR-680
-
-
Su, J.1
Scott, J.2
Hui, P.3
Upton, E.4
Lim, M.H.5
Diot, C.6
Crowcroft, J.7
Goel, A.8
De Lara, E.9
-
41
-
-
36949025380
-
Don't secure routing protocols, secure data delivery
-
D Wendlandt, I Avramopoulos, D Andersen, and J Rexford Don't Secure Routing Protocols, Secure Data Delivery In Proc HotNets, 2006.
-
(2006)
Proc HotNets
-
-
Wendlandt, D.1
Avramopoulos, I.2
Andersen, D.3
Rexford, J.4
|