Internet architecture

Results: 12640



#Item
251Internet / Network architecture / Computing / Network access / Net neutrality / Peering / Toronto Internet Exchange / Internet exchange point / Internet transit / Tier 1 network / Network access point / London Internet Exchange

Remote Peering: More Peering without Internet Flattening Ignacio Castro § §†∗

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:40
252Computing / Internet / France Mdias Monde / Radio France / Radio France Internationale / Radio in France / File Transfer Protocol / Network architecture

Network international Technical Community This document highlights the high level changes that have been applied to the second version (v1.1) of the Network collaborative Protection Profile (cPP) and Supporting Documen

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 15:14:58
253Computing / Network architecture / Internet / Internet privacy / Cryptographic protocols / Computer networking / Hypertext Transfer Protocol / Secure communication / Proxy server / Keystore / Localhost / HTTPS

The TCPSniffer Table of contents 1 Starting the TCPSniffer................................................................................................ 2 2 Using the TCPSniffer as an HTTP proxy........................

Add to Reading List

Source URL: grinder.sourceforge.net

Language: English - Date: 2014-05-20 07:02:12
254Internet / Computing / Network architecture / Routing protocols / Toronto Internet Exchange / Border Gateway Protocol / Peering / American Registry for Internet Numbers

MICE UG 18 Minutes Meeting called to order on Wednesday, March 23rd at 3:01 PM CST in the 511 Building Cafeteria. Roll Call • Number of Connected Member:

Add to Reading List

Source URL: www.micemn.net

Language: English - Date: 2016-06-27 18:46:51
255Computing / Network architecture / Internet / Computer networking / Routing / Border Gateway Protocol / Convergence / Router / IP forwarding

FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing Yiqing Ren∗ Wenchao Zhou∗ Anduo Wang∗ Limin Jia† Alexander J.T. Gurney∗ Boon Thau Loo∗ Jennifer Rexford‡ ∗

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:52:39
256Computing / Network architecture / Internet / Internet Standards / IP addresses / Internet Protocol / IPv6 / Wireless networking / Dynamic Host Configuration Protocol / MAC address / Link-local address / IPv4

Wi-Fi Internet connectivity and privacy: hiding your tracks on the wireless Internet Carlos J. Bernardos∗, Juan Carlos Z´un´ iga†, Piers O’Hanlon‡ ∗ Universidad Carlos III de Madrid. E-mail:

Add to Reading List

Source URL: www.it.uc3m.es

Language: English - Date: 2015-09-03 12:41:39
257Internet / Computing / Cryptographic protocols / Cryptography / X.509 / Internet Architecture Board / Housley / Internet Engineering Task Force / S/MIME / IEEE 802.11i-2004

Mr. Housley is the Founder of Vigil Security, LLC, and he is coauthor of “Planning for PKI” and “Implementing Email and Security Tokens” published by John Wiley & Sons. He has over 30 years of communications and

Add to Reading List

Source URL: www.ianacg.org

Language: English - Date: 2015-02-06 01:41:13
258Computing / Distributed data storage / Network architecture / Internet / Crowds / Onion routing / Tapestry / Routing / IP multicast / Multicast / Pastry / Degree of anonymity

AP3: Cooperative, decentralized anonymous communication Alan Mislove† Gaurav Oberoi† Ansley Post†

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2004-09-10 14:15:12
259Computing / Computer architecture / Transaction processing / Concurrency control / Linearizability / Client / Permutation / Internet Relay Chat / Transmission Control Protocol / Sequential consistency / Model theory

Fail-Aware Untrusted Storage§ Christian Cachin∗ Idit Keidar† Alexander Shraer‡

Add to Reading List

Source URL: webee.technion.ac.il

Language: English - Date: 2011-01-31 07:19:16
260Computing / Internet / Cryptographic protocols / Secure communication / Network architecture / Transport Layer Security / Internet Standards / HTTPS

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-29 00:54:14
UPDATE