메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Lost in the edge: Finding your way with signposts

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); COMPUTER ARCHITECTURE; INTERNET PROTOCOLS; NETWORK ARCHITECTURE; PEER TO PEER NETWORKS;

EID: 85084164688     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (33)
  • 1
    • 85080608672 scopus 로고    scopus 로고
    • Iodine. http://code.kryo.se/iodine/.
    • Iodine
  • 6
    • 80052862897 scopus 로고    scopus 로고
    • Rethinking the design of the internet: The end-to-end arguments vs: The brave new world
    • Aug
    • BLUMENTHAL, M. S., AND CLARK, D. D. Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world. ACM Transactions on Internet Technology (Aug. 2001).
    • (2001) ACM Transactions on Internet Technology
    • Blumenthal, M.S.1    Clark, D.D.2
  • 14
    • 24344468879 scopus 로고    scopus 로고
    • Unmanaged internet protocol: Taming the edge network management crisis
    • Jan
    • FORD, B. Unmanaged Internet Protocol: taming the edge network management crisis. SIGCOMM Comput. Commun. Rev. 34, 1 (Jan. 2004).
    • (2004) SIGCOMM Comput. Commun. Rev. 34 , pp. 1
    • Ford, B.1
  • 17
    • 70349250695 scopus 로고    scopus 로고
    • Identity trail: Covert surveillance using dns
    • Springer
    • GUHA, S., AND FRANCIS, P. Identity trail: Covert surveillance using dns. In Privacy Enhancing Technologies (2007), Springer.
    • (2007) Privacy Enhancing Technologies
    • Guha, S.1    Francis, P.2
  • 20
    • 10644239491 scopus 로고    scopus 로고
    • USA patriot act and telecommunications: Privacy under attack, the
    • LEE, L. T. USA patriot act and telecommunications: Privacy under attack, the. Rutgers Computer & Tech. LJ 29 (2003), 371.
    • (2003) Rutgers Computer & Tech. LJ , vol.29 , pp. 371
    • Lee, L.T.1
  • 25
    • 85080629442 scopus 로고    scopus 로고
    • The near-term feasibility of P2P MMOG’s
    • IEEE
    • MILLER, J. L., AND CROWCROFT, J. The near-term feasibility of P2P MMOG’s. NetGames’10, IEEE.
    • NetGames’10
    • Miller, J.L.1    Crowcroft, J.2
  • 28
    • 77958138374 scopus 로고    scopus 로고
    • The akamai network: A platform for high-performance internet applications
    • August
    • NYGREN, E., SITARAMAN, R. K., AND SUN, J. The Akamai network: a platform for high-performance internet applications. SIGOPS Oper. Syst. Rev. 44 (August 2010).
    • (2010) SIGOPS Oper. Syst. Rev. , vol.44
    • Nygren, E.1    Sitaraman, R.K.2    Sun, J.3
  • 30
    • 84936755085 scopus 로고    scopus 로고
    • The resurrecting duckling
    • Springer
    • STAJANO, F. The resurrecting duckling. In Security Protocols (2000), Springer, pp. 183–194.
    • (2000) Security Protocols , pp. 183-194
    • Stajano, F.1
  • 32
    • 85080485609 scopus 로고    scopus 로고
    • Perspectives: Improving ssh-style host authentication with multi-path probing
    • USENIX Association
    • WENDLANDT, D., ANDERSEN, D. G., AND PERRIG, A. Perspectives: improving ssh-style host authentication with multi-path probing. ATC’08, USENIX Association.
    • ATC’08
    • Wendlandt, D.1    Andersen, D.G.2    Perrig, A.3
  • 33
    • 85080497189 scopus 로고    scopus 로고
    • Research of access control list in enterprise network management
    • W. Du, Ed.,. of Lecture Notes in Electrical Engineering. Springer London
    • YU, B., AND WANG, R. Research of access control list in enterprise network management. In Informatics and Management Science VI, W. Du, Ed., vol. 209 of Lecture Notes in Electrical Engineering. Springer London, 2013.
    • (2013) Informatics and Management Science VI , vol.209
    • Yu, B.1    Wang, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.