-
1
-
-
84907318391
-
-
Mining Hardware Comparison. https://en.bitcoin.it/wiki/Mining-hardware- comparison.
-
-
-
-
2
-
-
84907358326
-
-
University of Oregon Route Views Project. http://www.routeviews.org.
-
-
-
-
4
-
-
65249188655
-
Accountable internet protocol (AIP)
-
New York, NY, USA, ACM
-
D. G. Andersen, H. Balakrishnan, N. Feamster, et al. Accountable internet protocol (AIP). SIGCOMM '08, pages 339-350, New York, NY, USA, 2008. ACM.
-
(2008)
SIGCOMM '08
, pp. 339-350
-
-
Andersen, D.G.1
Balakrishnan, H.2
Feamster, N.3
-
7
-
-
47249151432
-
Accountability as a service
-
A. Bender, N. Spring, D. Levin, and B. Bhattacharjee. Accountability as a service. SRUTI, 7:1-6, 2007.
-
(2007)
SRUTI
, vol.7
, pp. 1-6
-
-
Bender, A.1
Spring, N.2
Levin, D.3
Bhattacharjee, B.4
-
8
-
-
84884478474
-
High-speed high-security signatures
-
D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B.-Y. Yang. High-speed high-security signatures. Journal of Cryptographic Engineering, 2(2):77-89, 2012.
-
(2012)
Journal of Cryptographic Engineering
, vol.2
, Issue.2
, pp. 77-89
-
-
Bernstein, D.J.1
Duif, N.2
Lange, T.3
Schwabe, P.4
Yang, B.-Y.5
-
9
-
-
84907378362
-
-
Technical Report UCAM-CL-TR-849, University of Cambridge, Computer Laboratory, Mar.
-
M. B. Braun and J. Crowcroft. SNA: Sourceless Network Architecture. Technical Report UCAM-CL-TR-849, University of Cambridge, Computer Laboratory, Mar. 2014.
-
(2014)
SNA: Sourceless Network Architecture
-
-
Braun, M.B.1
Crowcroft, J.2
-
10
-
-
84945135810
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Advances in Cryptology-EUROCRYPT 2001, pages 93-118. Springer, 2001. (Pubitemid 33275827)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
84890583004
-
IPv6 source addresses considered harmful
-
C. Candolin and P. Nikander. IPv6 source addresses considered harmful. In NordSec '01, pages 54-68, 2001.
-
(2001)
NordSec '01
, pp. 54-68
-
-
Candolin, C.1
Nikander, P.2
-
12
-
-
0019532104
-
UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
-
DOI 10.1145/358549.358563
-
D. Chaum. Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
13
-
-
7744243126
-
Tussle in cyberspace: Defining tomorrow's internet
-
New York, NY, USA, ACM
-
D. D. Clark, J. Wroclawski, K. R. Sollins, and R. Braden. Tussle in cyberspace: defining tomorrow's internet. SIGCOMM '02, pages 347-356, New York, NY, USA, 2002. ACM.
-
(2002)
SIGCOMM '02
, pp. 347-356
-
-
Clark, D.D.1
Wroclawski, J.2
Sollins, K.R.3
Braden, R.4
-
14
-
-
39049160574
-
Constructing inter-domain packet filters to control ip spoofing based on bgp updates
-
Z. Duan, X. Yuan, and J. Chandrashekar. Constructing inter-domain packet filters to control ip spoofing based on bgp updates. In INFOCOM, 2006.
-
(2006)
INFOCOM
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
17
-
-
85050224259
-
XIA: Efficient support for evolvable internetworking
-
Berkeley, CA, USA, USENIX Association
-
D. Han, A. Anand, F. Dogar, et al. XIA: efficient support for evolvable internetworking. NSDI'12, pages 23-23, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
NSDI'12
, pp. 23-23
-
-
Han, D.1
Anand, A.2
Dogar, F.3
-
19
-
-
84878348946
-
Lap: Lightweight anonymity and privacy
-
IEEE
-
H.-C. Hsiao, T.-J. Kim, A. Perrig, et al. Lap: Lightweight anonymity and privacy. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 506-520. IEEE, 2012.
-
(2012)
Security and Privacy (SP), 2012 IEEE Symposium on
, pp. 506-520
-
-
Hsiao, H.-C.1
Kim, T.-J.2
Perrig, A.3
-
20
-
-
76749083002
-
Networking named content
-
New York, NY, USA, ACM
-
V. Jacobson, D. K. Smetters, J. D. Thornton, et al. Networking named content. CoNEXT '09, pages 1-12, New York, NY, USA, 2009. ACM.
-
(2009)
CoNEXT '09
, pp. 1-12
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
-
21
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed ddos traffic
-
ACM
-
C. Jin, H. Wang, and K. G. Shin. Hop-count filtering: an effective defense against spoofed ddos traffic. In CCS '03, pages 30-41. ACM, 2003.
-
(2003)
CCS '03
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
22
-
-
50849141961
-
Generic identifiers for id/locator split internetworking
-
V. Kafle, K. Nakauchi, and M. Inoue. Generic identifiers for id/locator split internetworking. In K-INGN 2008., pages 299-306, 2008.
-
(2008)
K-INGN 2008
, pp. 299-306
-
-
Kafle, V.1
Nakauchi, K.2
Inoue, M.3
-
23
-
-
84924375780
-
Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds. In NSDI '05.
-
NSDI '05
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
28
-
-
84889753542
-
Verifying and enforcing network paths with icing
-
New York, NY, USA, ACM
-
J. Naous, M. Walfish, A. Nicolosi, et al. Verifying and enforcing network paths with icing. CoNEXT '11, pages 30:1-30:12, New York, NY, USA, 2011. ACM.
-
(2011)
CoNEXT '11
-
-
Naous, J.1
Walfish, M.2
Nicolosi, A.3
-
29
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets
-
DOI 10.1145/964723.383061
-
K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets. In SIGCOMM CCR, volume 31, pages 15-26. ACM, 2001. (Pubitemid 32981951)
-
(2001)
Computer Communication Review
, vol.31
, Issue.4
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
30
-
-
69949168070
-
Enlisting ISPs to improve online privacy: IP address mixing by default
-
B. Raghavan, T. Kohno, A. C. Snoeren, and D. Wetherall. Enlisting ISPs to improve online privacy: IP address mixing by default. PETS '09, pages 143-163, 2009.
-
(2009)
PETS '09
, pp. 143-163
-
-
Raghavan, B.1
Kohno, T.2
Snoeren, A.C.3
Wetherall, D.4
-
32
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
M. K. Reiter and A. D. Rubin. Crowds: Anonymity for web transactions. TISSEC, 1(1):66-92, 1998.
-
(1998)
TISSEC
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
36
-
-
57949103947
-
TVA: A DoS-limiting network architecture
-
X. Yang, D. Wetherall, and T. Anderson. TVA: A DoS-limiting network architecture. Networking, IEEE/ACM Transactions on, 16(6):1267-1280, 2008.
-
(2008)
Networking, IEEE/ACM Transactions on
, vol.16
, Issue.6
, pp. 1267-1280
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
-
37
-
-
80051959854
-
SCION: Scalability, control, and isolation on next-generation networks
-
X. Zhang, H.-C. Hsiao, G. Hasker, et al. SCION: Scalability, control, and isolation on next-generation networks. In Security and Privacy 2011(SP), 2011 IEEE Symposium on, pages 212-227, 2011.
-
(2011)
Security and Privacy 2011(SP), 2011 IEEE Symposium on
, pp. 212-227
-
-
Zhang, X.1
Hsiao, H.-C.2
Hasker, G.3
-
38
-
-
84893398369
-
Scalable, high performance ethernet forwarding with cuckooswitch
-
New York, NY, USA, ACM
-
D. Zhou, B. Fan, H. Lim, M. Kaminsky, and D. G. Andersen. Scalable, high performance ethernet forwarding with cuckooswitch. CoNEXT '13, pages 97-108, New York, NY, USA, 2013. ACM.
-
(2013)
CoNEXT '13
, pp. 97-108
-
-
Zhou, D.1
Fan, B.2
Lim, H.3
Kaminsky, M.4
Andersen, D.G.5
|