Source string Source string

English Actions
Gont, F., `Security Assessment of the Transmission Control Protocol (TCP) <http://tools.ietf.org/html/draft-ietf-tcpm-tcp-security-02>`_,Security Assessment of the Transmission Control Protocol (TCP), Internet draft, work in progress, Jan. 2011
Chi, Y., Oliveira, R., Zhang, L., `Cyclops: The Internet AS-level Observatory <https://dx.doi.org/10.1145/1452335.1452337>`_, ACM SIGCOMM Computer Communication Review (CCR), October 2008
Carr, B., Sury, O., Palet Martinez, J., Davidson, A., Evans, R., Yilmaz, F., Wijte, Y., `IPv6 Address Allocation and Assignment Policy <http://www.ripe.net/ripe/docs/ipv6policy.html>`_, RIPE document ripe-481, September 2009
Clark D., `The Design Philosophy of the DARPA Internet Protocols <https://dx.doi.org/10.1145/205447.205458>`_, Computer Communications Review 18:4, August 1988, pp. 106-114
Cohen, D., `On Holy Wars and a Plea for Peace`, IEN 137, April 1980, http://www.ietf.org/rfc/ien/ien137.txt
CWE-444, `Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') <https://cwe.mitre.org/data/definitions/444.html>`_, https://cwe.mitre.org/data/definitions/444.html
Donahoo, M., Calvert, K., `TCP/IP Sockets in C: Practical Guide for Programmers <http://books.google.com/books?id=dmt_mERzxV4C>`_ , Morgan Kaufman, 2009
Diffie, W., Hellman, M., `New directions in cryptography`, in Information Theory, IEEE Transactions on , vol.22, no.6, pp.644-654, Nov 1976, https://dx.doi.org/10.1109/TIT.1976.1055638
Digital, Intel, Xerox, `The Ethernet: a local area network: data link layer and physical layer specifications <http://doi.acm.org/10.1145/1015591.1015594>`_. SIGCOMM Computer Communication Review 11, 3 (Jul. 1981), 20-66.
Dimitropoulos, X., Krioukov, D., Fomenkov, M., Huffaker, B., Hyun, Y., Claffy, K., Riley, G., `AS Relationships: Inference and Validation <http://doi.acm.org/10.1145/1198255.1198259>`_, ACM SIGCOMM Computer Communication Review (CCR), Jan. 2007
Dalal, Y. K. and Printis, R. S., `48-bit absolute internet and Ethernet host numbers <http://doi.acm.org/10.1145/800081.802680>`_. In Proceedings of the Seventh Symposium on Data Communications (Mexico City, Mexico, October 27 - 29, 1981). SIGCOMM '81. ACM, New York, NY, 240-245.
Dukkipati, N., Refice, T., Cheng, Y., Chu, J., Herbert, T., Agarwal, A., Jain, A., Sutin, N., `An Argument for Increasing TCP's Initial Congestion Window <https://dx.doi.org/10.1145/1823844.1823848>`_, ACM SIGCOMM Computer Communications Review, vol. 40 (2010), pp. 27-33
Dubuisson, `ASN.1 : Communication between Heterogeneous Systems <http://www.oss.com/asn1/resources/books-whitepapers-pubs/asn1-books.html#dubuisson>`, Morgan Kauffman, 2000
Daemen, J., Rijmen, V., `The Design of Rijndael: AES – The Advanced Encryption Standard <http://www.springer.com/us/book/9783540425809>`_ Springer, 2002. ISBN 3-540-42580-2.
Davik, F. Yilmaz, M. Gjessing, S. Uzun, N., `IEEE 802.17 resilient packet ring tutorial <https://dx.doi.org/10.1109/MCOM.2004.1273782>`_, IEEE Communications Magazine, Mar 2004, Vol 42, N 3, p. 112-118
Dijkstra, E., `A Note on Two Problems in Connection with Graphs <https://dx.doi.org/10.1007/BF01386390>`_. Numerische Mathematik, 1:269- 271, 1959
Wikipedia, `Dijkstra's algorithm <https://en.wikipedia.org/wiki/Dijkstra's_algorithm>`_
ETSI, TS 103 533-3, v 1.1.1, `CYBER: Middlebox Security Protocol; Part 3: Profile for enterprise network and data center access control <https://www.etsi.org/deliver/etsi_ts/103500_103599/10352303/01.01.01_60/ts_10352303v010101p.pdf>`_, Oct. 2018
Fletcher, J., `An Arithmetic Checksum for Serial Transmissions <https://dx.doi.org/10.1109/TCOM.1982.1095369>`_, Communications, IEEE Transactions on, Jan. 1982, Vol. 30, N. 1, pp. 247-252
Francois, P., Filsfils, C., Evans, J., and Bonaventure, O., `Achieving sub-second IGP convergence in large IP networks <http://doi.acm.org/10.1145/1070873.1070877>`_. SIGCOMM Computer Communication Review 35, 3 (Jul. 2005), 35-44.
Sally Floyd and Van Jacobson. 1993. `Random early detection gateways for congestion avoidance <https://dx.doi.org/10.1109/90.251892>`_. IEEE/ACM Transactions Networking 1, 4 (August 1993), 397-413.
Floyd, S., and Jacobson, V., `The Synchronization of Periodic Routing Messages <https://dx.doi.org/10.1109/90.298431>`_, IEEE/ACM Transactions on Networking, V.2 N.2, p. 122-136, April 1994
Freier, A., Karlton, P., Kocher, C., `The SSL Protocol Version 3.0`, Internet draft, November 1996, https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00
Fortz, B. Rexford, J. ,Thorup, M., `Traffic engineering with traditional IP routing protocols <https://dx.doi.org/10.1109/MCOM.2002.1039866>`_, IEEE Communication Magazine, October 2002
Theodore Faber, Joe Touch, and Wei Yue, `The TIME-WAIT state in TCP and Its Effect on Busy Servers <https://dx.doi.org/10.1109/INFCOM.1999.752180>`_, Proceedings INFOCOM'99, pp. 1573
Feldmeier, D. C., `Fast software implementation of error detection codes <https://dx.doi.org/10.1109/90.477710>`_. IEEE/ACM Transactions Networking 3, 6 (Dec. 1995), 640-651.
Govindan, R., Alaettinoglu, C., Varadhan, K., Estrin, D., `An Architecture for Stable, Analyzable Internet Routing <https://dx.doi.org/10.1109/65.750447>`_, IEEE Network Magazine, Vol. 13, No. 1, pp. 29--35, January 1999
Grier, D., Campbell, M., `A social history of Bitnet and Listserv <http://www.computer.org/portal/web/csdl/doi/10.1109/85.841135>`_, 1985-1991, Annals of the History of Computing, IEEE, Volume 22, Issue 2, Apr-Jun 2000, pp. 32 - 41
Genilloud, G., `X.400 MHS: first steps towards an EDI communication standard <http://doi.acm.org/10.1145/378570.378712>`_. SIGCOMM Computer Communication Review 20, 2 (Apr. 1990), 72-86.
Greenwald, `No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State <https://books.google.be/books?isbn=1627790748>`_, Metropolitan books, 2014
Gao, L., Griffin, T., Rexford, J., `Inherently safe backup routing with BGP <https://dx.doi.org/10.1109/INFCOM.2001.916777>`_, Proceedings IEEE INFOCOM, April 2001

Loading…

No matching activity found.
Browse all component changes

Glossary

English English
No related strings found in the glossary.

String information

Flags
read-only
Source string location
../../bibliography.rst:66
String age
4 years ago
Source string age
4 years ago
Translation file
locale/pot/bibliography.pot, string 47