Source string Source string

English Actions
Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K.G., Vallina-Rodriguez, N. and Caballero, J., 2018, October. `Coming of age: A longitudinal study of TLS deployment <https://doi.org/10.1145/3278532.3278568>`_. In Proceedings of the Internet Measurement Conference 2018 (pp. 415-428). ACM.
Kleinrock, L., Tobagi, F., `Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and their Throughput-Delay Characteristics <https://dx.doi.org/10.1109/TCOM.1975.1092768>`_, IEEE Transactions on Communications, Vol. COM-23, No. 12, pp. 1400-1416, December 1975.
Katz, D., Ward, D., `Bidirectional Forwarding Detection`, :rfc:`5880`, June 2010
Khanna, A. and Zinky, J. 1989. `The revised ARPANET routing metric <http://doi.acm.org/10.1145/75247.75252>`_. SIGCOMM Computer Communication Review 19, 4 (Aug. 1989), 45-56.
Lamport, L., `Password authentication with insecure communication <http://doi.acm.org/10.1145/358790.358797>`_. Communications ACM 24, 11 (November 1981), 770-772.
Eng Keong Lua, Crowcroft, J., Pias, M., Sharma, R., Lim, S., `A survey and comparison of peer-to-peer overlay network schemes <https://dx.doi.org/10.1109/COMST.2005.1610546>`_, Communications Surveys & Tutorials, IEEE, Volume: 7 , Issue: 2, 2005, pp. 72-93
Leroy, D. and O. Bonaventure, `Preparing network configurations for IPv6 renumbering <http://inl.info.ucl.ac.be/system/files/dleroy-nem-2009.pdf>`_, International Journal of Network Management, 2009
Leffler, S., Fabry, R., Joy, W., Lapsley, P., Miller, S., Torek, C., `An Advanced 4.4BSD Interprocess Communication Tutorial <http://docs.freebsd.org/44doc/psd/21.ipc/paper.pdf>`_, 4.4 BSD Programmer's Supplementary Documentation
Leboudec, J.-Y., `Rate Adaptation Congestion Control and Fairness : a tutorial <http://ica1www.epfl.ch/PS_files/LEB3132.pdf>`_, Dec. 2008
McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J., `OpenFlow: enabling innovation in campus networks <https://doi.org/10.1145/1355734.1355746>`_. ACM SIGCOMM Computer Communication Review. 2008 Mar 31;38(2):69-74.
McQuillan, J. M., Richer, I., and Rosen, E. C., `An overview of the new routing algorithm for the ARPANET <http://doi.acm.org/10.1145/800092.802981>`_. In Proceedings of the Sixth Symposium on Data Communications (Pacific Grove, California, United States, November 27 - 29, 1979). SIGCOMM '79. ACM, New York, NY, 63-68.
McQuillan, J.M., Richer, I., Rosen, E., `The New Routing Algorithm for the ARPANET <https://dx.doi.org/10.1109/TCOM.1980.1094721>`_ Communications, IEEE Transactions on , vol.28, no.5, pp.711,719, May 1980
Mathis, M., Semke, J., Mahdavi, J., and Ott, T. 1997. `The macroscopic behavior of the TCP congestion avoidance algorithm <http://doi.acm.org/10.1145/263932.264023>`_. SIGCOMM Computer Communication Review 27, 3 (Jul. 1997), 67-82.
Mühlbauer, W., Uhlig, S., Fu, B., Meulle, M., and Maennel, O., `In search for an appropriate granularity to model routing policies <http://doi.acm.org/10.1145/1282380.1282398>`_. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Kyoto, Japan, August 27 - 31, 2007). SIGCOMM '07. ACM, New York, NY, 145-156.
Malkin, G., `RIP: An Intra-Domain Routing Protocol <http://books.google.com/books?id=BtJpQgAACAAJ>`_, Addison Wesley, 1999
Metcalfe R., Boggs, D., `Ethernet: Distributed packet-switching for local computer networks <http://doi.acm.org/10.1145/360248.3602530>`_. Communications of the ACM, 19(7):395--404, 1976.
Mills, D.L., `Computer Network Time Synchronization: the Network Time Protocol <http://books.google.com/books?id=pdTcJBfnbq8C>`_. CRC Press, March 2006, 304 pp.
Mogul, J. , `The case for persistent-connection HTTP <http://doi.acm.org/10.1145/217382.217465>`_. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols For Computer Communication (Cambridge, Massachusetts, United States, August 28 - September 01, 1995). D. Oran, Ed. SIGCOMM '95. ACM, New York, NY, 299-313.
Modadugu, N. and Rescorla, E., 2004, February. `The Design and Implementation of Datagram TLS <https://www.ndss-symposium.org/wp-content/uploads/2017/09/Modadugu.pdf>`_. In NDSS.
Moy, J., `OSPF: Anatomy of an Internet Routing Protocol <http://books.google.com/books?id=YXUWsqVhx60C>`_, Addison Wesley, 1998
Menezes, A., van Oorschot, P. and Vanstone, S. , `Handbook of Applied Cryptography <http://cacr.uwaterloo.ca/hac/>`_ , CRC Press, 2011
Myers, B. A., `A brief history of human-computer interaction technology <http://doi.acm.org/10.1145/274430.274436>`_. interactions 5, 2 (Mar. 1998), 44-54.
Nelson, T. H., `Complex information processing: a file structure for the complex, the changing and the indeterminate <http://doi.acm.org/10.1145/800197.806036>`_. In Proceedings of the 1965 20th National Conference (Cleveland, Ohio, United States, August 24 - 26, 1965). L. Winner, Ed. ACM '65. ACM, New York, NY, 84-100.
Nygren E, Sitaraman RK, Sun J., `The Akamai network: a platform for high-performance Internet applications <https://doi.org/10.1145/1842733.1842736>`_. ACM SIGOPS Operating Systems Review. 2010 Aug 17;44(3):2-19.
Paxson, V. , `End-to-end Internet packet dynamics <http://doi.acm.org/10.1145/263109.263155>`_. SIGCOMM Computer Communication Review 27, 4 (Oct. 1997), 139-152.
Perlman, R., `An algorithm for distributed computation of a spanning tree in an extended LAN <http://doi.acm.org/10.1145/318951.319004>`_. SIGCOMM Computer Communication Review 15, 4 (September 1985), 44-53.
Perlman, R., `Interconnections : Bridges, routers, switches and internetworking protocols <http://books.google.com/books?id=AIRitf5C-QQC&pgis=1>`_, 2nd edition, Addison Wesley, 2000
Prado, A., Harris, N., and Y. Gluck, `The BREACH Attack <http://breachattack.com>`_ , 2013, <http://breachattack.com/>.
Rago, S., `UNIX System V network programming <http://www.pearsonhighered.com/educator/product/UNIX-System-V-Network-Programming/9780201563184.page>`_, Addison Wesley, 1993
Rescorla, E., `Stanford Seminar - The TLS 1.3 protocol <https://www.youtube.com/watch?v=grRi-aFrbSE>`_, Nov. 2015
Ristic, I., `Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Web Servers and Applications <https://books.google.be/books?id=fQOLBAAAQBAJ>`_, Feisty Duck, 2015

Loading…

No matching activity found.
Browse all component changes

Glossary

English English
No related strings found in the glossary.

String information

Flags
read-only
Source string location
../../bibliography.rst:139
String age
5 years ago
Source string age
5 years ago
Translation file
locale/pot/bibliography.pot, string 105