Protocol Independent Multicast

Results: 44



#Item
1A Secure Multicast Architecture of Using Host Identity Protocol

A Secure Multicast Architecture of Using Host Identity Protocol

Add to Reading List

Source URL: www.eei.edu.cn

Language: English - Date: 2010-10-17 23:11:04
2Joint Design of Multicast Loss Recovery and Forwarding Service Extensions Adam M. Costello http://www.cs.berkeley.edu/˜amcMay-05

Joint Design of Multicast Loss Recovery and Forwarding Service Extensions Adam M. Costello http://www.cs.berkeley.edu/˜amcMay-05

Add to Reading List

Source URL: www.nicemice.net

Language: English - Date: 1999-11-07 15:38:21
3You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-10 15:32:10
4Multicast Routers Cooperating with Channel Announcement System

Multicast Routers Cooperating with Channel Announcement System

Add to Reading List

Source URL: web.sfc.wide.ad.jp

Language: English - Date: 2004-02-16 05:26:35
5draft-ietf-rtgwg-mofrr-06 - Multicast only Fast Re-Route

draft-ietf-rtgwg-mofrr-06 - Multicast only Fast Re-Route

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-05-22 11:03:01
6Multicast Peering Steve Rubin Layer42 Networks   What is IP Multicast?

Multicast Peering Steve Rubin Layer42 Networks What is IP Multicast?

Add to Reading List

Source URL: www.seattleix.net

Language: English - Date: 2009-04-10 14:59:04
71  MERLIN: MEasure the Router Level of the INternet Pascal M´erindol∗ , Benoit Donnet† , Jean-Jacques Pansiot∗ , Matthew Luckie‡ , Young Hyun∗∗ ∗ LSIIT, Universit´e de Strasbourg – France † ICTEAM, Un

1 MERLIN: MEasure the Router Level of the INternet Pascal M´erindol∗ , Benoit Donnet† , Jean-Jacques Pansiot∗ , Matthew Luckie‡ , Young Hyun∗∗ ∗ LSIIT, Universit´e de Strasbourg – France † ICTEAM, Un

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-12 18:35:38
8iSAVE: Incrementally Deployable Source Address Validation ∗ Jelena Mirkovi´c, Zhiguo Xu, Jun Li, Matthew Schnaider, Peter Reiher, and Lixia Zhang Abstract Reliable information concerning the reverse path to a particul

iSAVE: Incrementally Deployable Source Address Validation ∗ Jelena Mirkovi´c, Zhiguo Xu, Jun Li, Matthew Schnaider, Peter Reiher, and Lixia Zhang Abstract Reliable information concerning the reverse path to a particul

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-09-28 19:29:54
9Automatic Multicast Tunneling & Upipe: a Proof of Concept Christophe Massiot (FOSDEM 2015) AMT & Upipe: a Proof of Concept

Automatic Multicast Tunneling & Upipe: a Proof of Concept Christophe Massiot (FOSDEM 2015) AMT & Upipe: a Proof of Concept

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-01-30 10:36:09
10Datasheet | Operating System  AlliedWare® Operating System AlliedWare Layer 3 Fully Featured Operating System

Datasheet | Operating System AlliedWare® Operating System AlliedWare Layer 3 Fully Featured Operating System

Add to Reading List

Source URL: www.alliedtelesis.co.uk

Language: English - Date: 2010-10-12 14:36:10