Network protocols

Results: 10979



#Item
761Computing / Internet / Internet Standards / Internet protocols / Web hosting / Network architecture / Domain Name System / Web hosting service

Complaint Policy Below you will find our current complaint policy. If you have any questions or comments about this policy, please do not hesitate to contact us. It is DNS Made Easy policy to handle complaints as part of

Add to Reading List

Source URL: www.dnsmadeeasy.com

Language: English - Date: 2015-12-08 13:37:23
762Computing / Internet / Network architecture / Computer network security / Computer networking / Transmission Control Protocol / Border Gateway Protocol / Router / Internet protocol suite / Packet loss / Firewall / Communications protocol

Application-Driven TCP Recovery and Non-Stop BGP Robert Surton, Ken Birman, and Robbert van Renesse Department of Computer Science, Cornell University Abstract—Some network protocols tie application state to underlying

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-04-22 08:52:17
763Computing / File sharing / Network protocols / Internet protocols / Computer networking / Information-centric networking / Scalability / ICN / Peer-to-peer / Hypertext Transfer Protocol

Proceedings Template - WORD

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:45:28
764Software / Computing / System software / Internet protocols / Network management / Computer network security / System administration / Internet Standards / Netfilter / Transmission Control Protocol / Port / Event correlation

Mano_Paul_Bookcover_Final

Add to Reading List

Source URL: ristov.github.io

Language: English - Date: 2016-03-01 13:52:01
765Internet Standards / Internet protocols / Routing protocols / Routing / Telecommunications engineering / Border Gateway Protocol / Peering / Internet service provider / Router / Multihoming / Network address translation / Computer network

Scalable Programmable Inbound Traffic Engineering Peng Sun Laurent Vanbever Jennifer Rexford

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2015-05-23 04:42:57
766Network protocols / Data transmission / Computer memory / Endianness / Metaphors / Financial Information eXchange / Transmission Control Protocol / Specific Area Message Encoding / Ping / Bit field

BATS Chi-X Europe TRF Binary Order Entry Specification VersionJanuary 2016

Add to Reading List

Source URL: cdn.batstrading.com

Language: English - Date: 2016-02-18 15:57:14
767Internet security / Internet Standards / Internet protocols / Routing / Secure communication / IP hijacking / Border Gateway Protocol / Tor / Traffic analysis / Onion routing / HTTPS / Computer network

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2014-10-08 09:38:20
768Computing / Network architecture / OSI protocols / Network performance / Computer networking / Routing algorithms / Carrier sense multiple access with collision avoidance / IEEE 802.11 / OSI model / Data link layer / Hidden node problem / Throughput

The Case for a Network Protocol Isolation Layer Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, and Philip Levis Computer Systems Laboratory Stanford University Stanford, CA USA

Add to Reading List

Source URL: sing.stanford.edu

Language: English - Date: 2014-11-10 18:30:11
769Computing / Network architecture / Network protocols / Network address translation / Internet / NAT traversal / Universal Plug and Play / STUN / Tor / Port forwarding / IPv6 / Traversal Using Relays around NAT

Tor and NAT devices: increasing bridge & relay reachability or, enabling the use of NAT–PMP and UPnP by default Jacob Appelbaum

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2012-08-22 05:33:30
770Computing / Cryptography / Network architecture / Cryptographic protocols / Computer network security / IPsec / Internet protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Online Certificate Status Protocol

Microsoft PowerPoint - LinuxTag2008_Flyer_VPN_Solution.ppt

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2008-06-25 02:51:57
UPDATE