Layer

Results: 11051



#Item
1Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
2Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benjaminvandersloot.com

Language: English - Date: 2018-09-18 11:06:16
3Computing / Information and communications technology / Computer networking / Data transmission / Network performance / Internet architecture / Teletraffic / Telecommunications engineering / Packet loss / Packet forwarding / Transmission Control Protocol / Traffic flow

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer Chen Chen Daniele E. Asoni

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
4Cryptocurrencies / Blockchains / Concurrent computing / Computing / Hashgraph / Distributed ledger / Ethereum / Hedera / NEO / Smart contract / Draft:Hedera Hashgraph

Hedera: A Governing Council & Public Hashgraph Network The trust layer of the internet Leemon Baird, Mance Harmon, and Paul Madsen w h i t e pa p e r   V.1 . 4    L a s t u p d at e d 1 7 O C T   SU B J

Add to Reading List

Source URL: www.hedera.com

Language: English - Date: 2018-10-17 22:19:08
5Cryptography / Secure communication / Message authentication codes / Transport Layer Security / Cryptographic protocols / Internet Standards / Cipher suite / Authenticated encryption / Poly1305 / Galois/Counter Mode / OpenSSL / Key generation

Implementing and Proving the TLS 1.3 Record Layer Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin Microsoft Research {antdl,fournet

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:36
6Computing / Information and communications technology / Data transmission / Computer networking / Network performance / Routing / Internet architecture / Teletraffic / Packet loss / Packet forwarding / Transmission Control Protocol / Traffic flow

arXiv:1802.08415v1 [cs.CR] 23 FebTARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer Chen Chen

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-02-25 20:30:14
7Firewall software / Computing / Computer security / Cyberwarfare / Internet security / Web applications / Web application firewall / Application firewall / Fastly / Application security / Firewall / HTTP/2

Fastly WAF Always on, world-class application-layer protection In 2016, 40% of web application threats led to breaches — a fivefold increase from the previous year. As the scope and complexity of application

Add to Reading List

Source URL: www.fastly.com

Language: English - Date: 2017-05-15 17:23:15
8

节点研究中心 Layer0 扩容专题 Layer 0 扩容专题 引言

Add to Reading List

Source URL: jinse-develop.oss-cn-shanghai.aliyuncs.com

Language: Chinese - Date: 2018-07-27 05:41:20
    9Cryptocurrencies / Decentralization / Bitcoin / Computing / Contract law / Information / Blockchain / Data / Business ethics / Contract / Economy

    THE LEGAL LAYER FOR A NETWORKED WORLD Published on 25 April 2018 Version: 1.0

    Add to Reading List

    Source URL: agreements.network

    Language: English - Date: 2018-09-17 12:27:40
    10Computer data storage / Computing / Computer memory / System software / Non-volatile memory / Embedded Linux / UBIFS / Flash memory / Memory Technology Device / Flash file system / Wear leveling / Data

    Formal Specification of an Erase Block Management Layer for Flash Memory ? J¨ org Pf¨ ahler, Gidon Ernst, Gerhard Schellhorn, Dominik Haneberg, and Wolfgang Reif

    Add to Reading List

    Source URL: www.isse.uni-augsburg.de

    Language: English - Date: 2017-01-11 10:46:01
    UPDATE