Internet architecture

Results: 12640



#Item
781Computing / Network architecture / Internet / Internet Standards / Routing protocols / Internet protocols / Routing / Computer networking / Border Gateway Protocol / Router / Forwarding plane / Control plane

Peer Pressure: Exerting Malicious Influence on Routers at a Distance Max Schuchard1 , Christopher Thompson2 , Nicholas Hopper1 , and Yongdae Kim3 1 Department of Computer Science and Engineering, University of Minnesota

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-07-08 10:49:22
782Computing / Internet / Network architecture / Internet protocols / Secure communication / Dark web / Internet security / Tor / Onion routing / Traffic analysis / Proxy server / Transmission Control Protocol

Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:49:00
783Internet / Domain name system / Computing / Network architecture / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Name server / Time to live

./by-Rlt--prod-all-zn-lt-ttl.eps

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English - Date: 2009-12-09 11:21:49
784Computing / Internet / Dark web / Computer architecture / Distributed computing architecture / Network architecture / PlanetLab / Software testing / Tor / Overlay network

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation Rob Jansen∗ U.S. Naval Research Laboratory Abstract

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2011-11-30 11:55:12
785Computing / Internet / Domain name system / Network architecture / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / Name server / Root name server

Validating Caching Resolver Wouter Wijngaards (NLnet Labs) http://www.nlnetlabs.nl/ © May 2008 Stichting NLnet Labs

Add to Reading List

Source URL: unbound.nlnetlabs.nl

Language: English - Date: 2008-05-19 08:09:35
786

The Internet™: A Solution for Openness Through Closedness By Kenneth Neil Cukier * Summary: The Internet is facing numerous challenges to its management and architecture. In reaction to those who advocate change, propo

Add to Reading List

Source URL: www.cukier.com

Language: English - Date: 2006-09-10 07:16:53
    787Computing / Internet / Network architecture / Tor / Internet Standards / Internet protocols / Dark web / Internet security / Anonymity / Peer-to-peer / Red team / The Tor Project /  Inc

    Collaborative Red Teaming for Anonymity System Evaluation Sandy Clark◦ Chris Wacek• Matt Blaze◦ Boon Thau Loo◦ Micah Sherr• Clay Shields• Jonathan Smith◦ ◦ University of Pennsylvania

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2012-08-16 08:18:23
    788Computing / Internet / Network architecture / Dark web / Internet Standards / Internet security / Secure communication / Tor / Routing / Proxy server / Low latency / Onion routing

    An Empirical Evaluation of Relay Selection in Tor Chris Wacek Georgetown University Henry Tan Georgetown University

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2012-12-16 11:56:26
    789Domain name system / Computer architecture / Computing / Internet / GNZ / Name server / Active Directory / CNAME record / Domain controller / Domain name / Fully qualified domain name / Windows Server

    DOC Document

    Add to Reading List

    Source URL: download.microsoft.com

    Language: English - Date: 2013-04-17 19:46:35
    790Internet / Domain name system / Computing / Network architecture / Internet governance / Country code top-level domains / Domain name registry / Uniform Domain-Name Dispute-Resolution Policy / Domain name / Draft:.vote / Anticybersquatting Consumer Protection Act

    Acceptable Use Policy This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered .BAYERN Domain Name. This Acceptable Use Policy forms part of the Registry Policies that apply

    Add to Reading List

    Source URL: nic.bayern

    Language: English - Date: 2014-06-24 05:45:10
    UPDATE