-
1
-
-
85080608672
-
-
Iodine. http://code.kryo.se/iodine/.
-
Iodine
-
-
-
2
-
-
33144457195
-
-
RFC 4033, IETF, Mar
-
ARENDS, R., AUSTEIN, R., LARSON, M., MASSEY, D., AND ROSE, S. DNS Security Introduction and Requirements. RFC 4033, IETF, Mar. 2005.
-
(2005)
DNS Security Introduction and Requirements
-
-
Arends, R.1
Austein, R.2
Larson, M.3
Massey, D.4
Rose, S.5
-
6
-
-
80052862897
-
Rethinking the design of the internet: The end-to-end arguments vs: The brave new world
-
Aug
-
BLUMENTHAL, M. S., AND CLARK, D. D. Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world. ACM Transactions on Internet Technology (Aug. 2001).
-
(2001)
ACM Transactions on Internet Technology
-
-
Blumenthal, M.S.1
Clark, D.D.2
-
9
-
-
79960193928
-
Is content publishing in bittorrent altruistic or profit-driven?
-
ACM
-
CUEVAS, R., KRYCZKA, M., CUEVAS, A., KAUNE, S., GUERRERO, C., AND REJAIE, R. Is content publishing in bittorrent altruistic or profit-driven? Co-NEXT’10, ACM.
-
Co-NEXT’10
-
-
Cuevas, R.1
Kryczka, M.2
Cuevas, A.3
Kaune, S.4
Guerrero, C.5
Rejaie, R.6
-
10
-
-
85080522104
-
Analysis of country-wide internet outages caused by censorship
-
ACM
-
DAINOTTI, A., SQUARCELLA, C., ABEN, E., CLAFFY, K. C., CHIESA, M., RUSSO, M., AND PESCAPÉ, A. Analysis of country-wide internet outages caused by censorship. IMC’11, ACM.
-
IMC’11
-
-
Dainotti, A.1
Squarcella, C.2
Aben, E.3
Claffy, K.C.4
Chiesa, M.5
Russo, M.6
Pescapé, A.7
-
12
-
-
70349680404
-
Detecting bittorrent blocking
-
ACM
-
DISCHINGER, M., MISLOVE, A., HAEBERLEN, A., AND GUMMADI, K. P. Detecting bittorrent blocking. IMC’08, ACM.
-
IMC’08
-
-
Dischinger, M.1
Mislove, A.2
Haeberlen, A.3
Gummadi, K.P.4
-
14
-
-
24344468879
-
Unmanaged internet protocol: Taming the edge network management crisis
-
Jan
-
FORD, B. Unmanaged Internet Protocol: taming the edge network management crisis. SIGCOMM Comput. Commun. Rev. 34, 1 (Jan. 2004).
-
(2004)
SIGCOMM Comput. Commun. Rev. 34
, pp. 1
-
-
Ford, B.1
-
15
-
-
36949033084
-
-
OSDI’06, USENIX Association
-
FORD, B., STRAUSS, J., LESNIEWSKI-LAAS, C., RHEA, S., KAASHOEK, F., AND MORRIS, R. Persistent personal names for globally connected mobile devices. OSDI’06, USENIX Association.
-
Persistent Personal Names for Globally Connected Mobile Devices
-
-
Ford, B.1
Strauss, J.2
Lesniewski-Laas, C.3
Rhea, S.4
Kaashoek, F.5
Morris, R.6
-
18
-
-
85010046368
-
Is it still possible to extend TCP?
-
ACM
-
HONDA, M., NISHIDA, Y., RAICIU, C., GREENHALGH, A., HANDLEY, M., AND TOKUDA, H. Is it still possible to extend TCP? IMC’11, ACM.
-
IMC’11
-
-
Honda, M.1
Nishida, Y.2
Raiciu, C.3
Greenhalgh, A.4
Handley, M.5
Tokuda, H.6
-
19
-
-
78650866419
-
Netalyzr: Illuminating the edge network
-
ACM
-
KREIBICH, C., WEAVER, N., NECHAEV, B., AND PAXSON, V. Netalyzr: illuminating the edge network. In Proceedings of the 10th annual conference on Internet measurement (2010), IMC’10, ACM, pp. 246–259.
-
Proceedings of the 10th Annual Conference on Internet Measurement (2010), IMC’10
, pp. 246-259
-
-
Kreibich, C.1
Weaver, N.2
Nechaev, B.3
Paxson, V.4
-
20
-
-
10644239491
-
USA patriot act and telecommunications: Privacy under attack, the
-
LEE, L. T. USA patriot act and telecommunications: Privacy under attack, the. Rutgers Computer & Tech. LJ 29 (2003), 371.
-
(2003)
Rutgers Computer & Tech. LJ
, vol.29
, pp. 371
-
-
Lee, L.T.1
-
22
-
-
85080586588
-
Unikernels: Library operating systems for the cloud
-
ACM
-
MADHAVAPEDDY, A., MORTIER, R., ROTSOS, C., SCOTT, D., SINGH, B., GAZAGNAIRE, T., SMITH, S., HAND, S., AND CROWCROFT, J. Unikernels: library operating systems for the cloud. ASPLOS’13, ACM.
-
ASPLOS’13
-
-
Madhavapeddy, A.1
Mortier, R.2
Rotsos, C.3
Scott, D.4
Singh, B.5
Gazagnaire, T.6
Smith, S.7
Hand, S.8
Crowcroft, J.9
-
24
-
-
68649129121
-
Open-flow: Enabling innovation in campus networks
-
MCKEOWN, N., ANDERSON, T., BALAKRISHNAN, H., PARULKAR, G., PETERSON, L., REXFORD, J., SHENKER, S., AND TURNER, J. Open-flow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review 38, 2 (2008).
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, pp. 2
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
25
-
-
85080629442
-
The near-term feasibility of P2P MMOG’s
-
IEEE
-
MILLER, J. L., AND CROWCROFT, J. The near-term feasibility of P2P MMOG’s. NetGames’10, IEEE.
-
NetGames’10
-
-
Miller, J.L.1
Crowcroft, J.2
-
26
-
-
3142619105
-
-
AND RFC 5201, IETF, Apr
-
MOSKOWITZ, R., NIKANDER, P., JOKELA, P., ED., AND HENDERSON, T. Host Identity Protocol. RFC 5201, IETF, Apr. 2008.
-
(2008)
Host Identity Protocol
-
-
Moskowitz, R.1
Nikander, P.2
Jokela, P.3
Henderson, T.4
-
28
-
-
77958138374
-
The akamai network: A platform for high-performance internet applications
-
August
-
NYGREN, E., SITARAMAN, R. K., AND SUN, J. The Akamai network: a platform for high-performance internet applications. SIGOPS Oper. Syst. Rev. 44 (August 2010).
-
(2010)
SIGOPS Oper. Syst. Rev.
, vol.44
-
-
Nygren, E.1
Sitaraman, R.K.2
Sun, J.3
-
30
-
-
84936755085
-
The resurrecting duckling
-
Springer
-
STAJANO, F. The resurrecting duckling. In Security Protocols (2000), Springer, pp. 183–194.
-
(2000)
Security Protocols
, pp. 183-194
-
-
Stajano, F.1
-
31
-
-
84871284967
-
Middleboxes no longer considered harmful
-
USENIX Association
-
WALFISH, M., STRIBLING, J., KROHN, M., BALAKRISHNAN, H., MORRIS, R., AND SHENKER, S. Middleboxes no longer considered harmful. OSDI’04, USENIX Association.
-
OSDI’04
-
-
Walfish, M.1
Stribling, J.2
Krohn, M.3
Balakrishnan, H.4
Morris, R.5
Shenker, S.6
-
32
-
-
85080485609
-
Perspectives: Improving ssh-style host authentication with multi-path probing
-
USENIX Association
-
WENDLANDT, D., ANDERSEN, D. G., AND PERRIG, A. Perspectives: improving ssh-style host authentication with multi-path probing. ATC’08, USENIX Association.
-
ATC’08
-
-
Wendlandt, D.1
Andersen, D.G.2
Perrig, A.3
-
33
-
-
85080497189
-
Research of access control list in enterprise network management
-
W. Du, Ed.,. of Lecture Notes in Electrical Engineering. Springer London
-
YU, B., AND WANG, R. Research of access control list in enterprise network management. In Informatics and Management Science VI, W. Du, Ed., vol. 209 of Lecture Notes in Electrical Engineering. Springer London, 2013.
-
(2013)
Informatics and Management Science VI
, vol.209
-
-
Yu, B.1
Wang, R.2
|