A Technical Approach to Net Neutrality
暂无分享,去创建一个
Xin Liu | Xiaowei Yang | Gene Tsudik | G. Tsudik | Xiaowei Yang | Xin Liu
[1] David E. Culler,et al. A blueprint for introducing disruptive technology into the Internet , 2003, CCRV.
[2] Zheng Wang,et al. An Architecture for Differentiated Services , 1998, RFC.
[3] Russell Impagliazzo,et al. Limits on the provable consequences of one-way permutations , 1988, STOC '89.
[4] Brenda Timmerman,et al. A security model for dynamic adaptive traffic masking , 1998, NSPW '97.
[5] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[6] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[7] Sachin Katti,et al. Slicing the Onion: Anonymous Routing Without PKI , 2005 .
[8] ShenkerScott,et al. Controlling high bandwidth aggregates in the network , 2002 .
[9] David L. Black,et al. An Architecture for Differentiated Service , 1998 .
[10] E. Felten,et al. Nuts and Bolts of Network Neutrality , 2006 .
[11] Scott Shenker,et al. Integrated Services in the Internet Architecture : an Overview Status of this Memo , 1994 .