Routing protocol

Results: 2050



#Item
431Internet / Network protocols / Routing protocols / Internet broadcasting / Multicast / Internet Group Management Protocol / Network layer / Allied Telesis / PIM Dense Mode / Network architecture / Computing / Internet protocols

Training | CAE-M/ENT Net.Campus Certified Allied Telesis Expert / Multicast Enterprise Solution Introduction

Add to Reading List

Source URL: alliedtelesis.pl

Language: English - Date: 2014-02-10 18:05:29
432Internet / Network protocols / Routing protocols / Internet broadcasting / Multicast / Internet Group Management Protocol / Network layer / Allied Telesis / PIM Dense Mode / Network architecture / Computing / Internet protocols

Training | CAE-M/ENT Net.Campus Certified Allied Telesis Expert / Multicast Enterprise Solution Introduction

Add to Reading List

Source URL: alliedtelesis.it

Language: English - Date: 2014-02-10 18:05:29
433Network architecture / Onion routing / Tor / Crowds / Communications protocol / Proxy server / Router / Internet privacy / Computing / Internet

A Model of Onion Routing with Provable Anonymity Joan Feigenbaum1? , Aaron Johnson1?? , and Paul Syverson2? ? ? 1 Yale University {Joan.Feigenbaum, aaron.johnson}@yale.edu

Add to Reading List

Source URL: www.onion-router.net

Language: English - Date: 2013-01-23 17:13:22
434Routing protocols / Networking hardware / Internet protocols / Internet standards / IP traceback / Router / Open Shortest Path First / Network address translation / Border Gateway Protocol / Computing / Network architecture / Internet

ARTICLE IN PRESS The Journal of Systems and Software xxxxxx–xxx www.elsevier.com/locate/jss OPERA: An open-source extensible router architecture for

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2005-03-26 04:26:42
435Network architecture / Tor / Transmission Control Protocol / Relay / Transport layer / SOCKS / Onion routing / Secure communication / Asynchronous Transfer Mode / Internet privacy / Computing / Internet

IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2015-06-06 16:07:00
436Internet standards / Internet protocols / Routing protocols / Routing / Computer network security / Border Gateway Protocol / IP hijacking / Router / Route Views / Internet / Network architecture / Computing

Through the Looking-Glass, and What Eve Found There Luca Bruno, Mariano Graziano, Davide Balzarotti, Aur´elien Francillon EURECOM {firstname.lastname}@eurecom.fr Abstract

Add to Reading List

Source URL: www.s3.eurecom.fr

Language: English - Date: 2014-08-08 13:49:05
437Onion routing / Tor / Universal composability / Routing / Traffic analysis / Public-key cryptography / Communications protocol / Cryptography / Internet privacy / Computing

Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Saarland University and MPI-SWS, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-03-20 11:08:29
438IPv6 / Network protocols / Internet standards / Tunneling protocols / IPv6 deployment / IPv4 / Classless Inter-Domain Routing / 6to4 / Mobile IP / Internet Protocol / Network architecture / Internet

The Design and Implementation of a Dual-stack Mobile Network using IPv6 Only Network Infrastructure WONEMO @ Sendai International Center, 19th Jan 2006 Keiichi SHIMA <>

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2006-04-24 21:57:32
439Electronic engineering / Markov processes / Markov chain / Cellular network / Mobility model / Mobile phone / Communications protocol / Mobility management / Routing in delay-tolerant networking / Technology / Mobile technology / Mobile telecommunications

Location Updates and Probabilistic Tracking Algorithms for Mobile Cellular Networks John C.S. Luiy, Cedric C.F. Fong Department of Computer Science & Engineering The Chinese University of Hong Kong, Hong Kong

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2007-06-30 05:06:27
440Information theory / Theoretical computer science / Routing / Computing / Telecommunications engineering / Network coding / MORE protocol / Randomized algorithm / Packet forwarding / Wireless networking / Coding theory / Finite fields

Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li John C.S. Lui

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-05-06 01:09:23
UPDATE