<--- Back to Details
First PageDocument Content
Computing / Technology / Routing / Distributed hash table / Chord / Network topology / Wireless ad-hoc network / Tapestry / Link-state routing protocol / Distributed data storage / Wireless networking / Network architecture
Date: 2011-02-08 05:11:44
Computing
Technology
Routing
Distributed hash table
Chord
Network topology
Wireless ad-hoc network
Tapestry
Link-state routing protocol
Distributed data storage
Wireless networking
Network architecture

Add to Reading List

Source URL: os.ibds.kit.edu

Download Document from Source Website

File Size: 830,38 KB

Share Document on Facebook

Similar Documents

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xVcN - View Document

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xV3c - View Document

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xUT6 - View Document

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xUSD - View Document

Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Internet protocols / Traceroute / Hop / Network topology / Forwarding plane / Computer network

NetHide: Secure and Practical Network Topology Obfuscation Roland Meier∗ , Petar Tsankov∗ , Vincent Lenders , Laurent Vanbever∗ , Martin Vechev∗ ∗ ETH Zürich

DocID: 1xUvT - View Document