Internet architecture

Results: 12640



#Item
31Computing / Internet / Network architecture / Internet protocols / Cryptographic protocols / Internet Standards / Tunneling protocols / Units of information / IPsec / Padding / Transport Layer Security / IPv4

Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele1 and Kenneth G. Paterson2 ?

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English
32Computing / Internet / Cryptographic protocols / Secure communication / Network architecture / Hypertext Transfer Protocol / Internet security / HTTPS / Crimeware / Internet privacy / Transport Layer Security / Bolt

Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-19 14:01:38
33Routing algorithms / Computing / Network architecture / Internet / Multipath routing / Routing

Microsoft PowerPoint - SecureRouting22Apr05ppt.ppt

Add to Reading List

Source URL: www.ece.ucsb.edu

Language: English - Date: 2013-10-30 21:30:35
34Computing / Network architecture / Internet / Internet Standards / Cultural globalization / New media / Telegraphy / Virtual reality / Stony Brook / RIPE Atlas / Communications protocol

Investigating Interdomain Routing Policies in the Wild Ruwaifa Anwar1, Haseeb Niaz1, David Choffnes2, Italo Cunha3, Phillipa Gill1, Ethan Katz-Bassett4 Stony Brook University, 2Northeastern University,

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-31 03:07:55
35Computing / Internet / Network architecture / Internet Protocol / Cultural globalization / Media technology / New media / Virtual reality / IPv6 / Fragmentation / Net neutrality / IPv4

Future of the Internet Initiative White Paper Internet Fragmentation: An Overview January 2016

Add to Reading List

Source URL: www3.weforum.org

Language: English - Date: 2016-01-22 03:03:53
36

Jari Arkko is Chair of the Internet Engineering Task Force (IETF) and an expert on Internet Architecture with Ericsson Research in Jorvas, Finland. At the IETF, he has previously served six years as one of the Internet A

Add to Reading List

Source URL: www.ianacg.org

- Date: 2015-02-06 01:41:24
    37Domain name system / Computing / Internet / Network architecture / Internet protocols / Internet Standards / Name server / Domain name / Comparison of DNS server software / Google Public DNS

    DIY DNS DFIR: You’re Doing it WRONG Andrew Hay, CISO DataGravity, Inc. twitter.com/andrewsmhay

    Add to Reading List

    Source URL: files.sans.org

    Language: English - Date: 2016-04-15 13:43:26
    38Computing / Network architecture / System software / Domain name system / Internet Protocol / RIPE Atlas / Ping / Routing / Transmission Control Protocol

    On the suitability of two large-scale Internet measurement platforms Thomas Holterbach, Cristel Pelsser, and Randy Bush Internet Initiative Japan Abstract. Both research and industry rely heavily on Internet performance

    Add to Reading List

    Source URL: thomasholterbach.net

    Language: English - Date: 2015-06-29 15:36:26
    39Computing / Concurrent computing / Distributed computing architecture / Load balancing / Videotelephony / Cloud infrastructure / Internet of things / Fog computing / Cloud computing / Cisco Systems / Big data / Edge computing

    White Paper Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are What You Will Learn The Internet of Things (IoT) is generating an unprecedented volume and variety of data. But by the time

    Add to Reading List

    Source URL: www.cisco.com

    Language: English
    40Computing / Internet protocols / Cryptography / Network architecture / Cryptographic protocols / Secure communication / Computer networking / QUIC / Network protocols / Datagram Transport Layer Security / Comparison of TLS implementations / Public-key cryptography

    2015 IEEE Symposium on Security and Privacy How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:43:10
    UPDATE