Networking named content
暂无分享,去创建一个
Van Jacobson | Diana K. Smetters | Rebecca Braynard | Michael F. Plass | James D. Thornton | Nicholas H. Briggs | Nick Briggs | J. D. Thornton | V. Jacobson | R. Braynard | M. Plass | D. Smetters
[1] Michael Walfish,et al. A layered naming architecture for the internet , 2004, SIGCOMM '04.
[2] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .
[3] Paul Vixie,et al. A DNS RR for specifying the location of services (DNS SRV) , 1996, RFC.
[4] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[5] Mark Handley,et al. Multicast Negative-Acknowledgment (NACK) Building Blocks , 2008, RFC.
[6] Srinivasan Seshan,et al. Packet caches on routers: the implications of universal redundant traffic elimination , 2008, SIGCOMM '08.
[7] 정희영,et al. IETF에서의 빠른 핸드오프 기술 표준화 동향 , 2002 .
[8] Martín Abadi,et al. On SDSI's linked local name spaces , 1997, Proceedings 10th Computer Security Foundations Workshop.
[9] Adrian Perrig,et al. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.
[10] Andrew S. Tanenbaum,et al. Securely replicated Web documents , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[11] Daniel Massey,et al. Security Through Publicity , 2006, HotSec.
[12] David Mazières,et al. Fast and secure distributed read-only file system , 2000, TOCS.
[13] Van Jacobson,et al. Congestion avoidance and control , 1988, SIGCOMM '88.
[14] Scott Shenker,et al. Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.
[15] Scott Shenker,et al. A data-oriented (and beyond) network architecture , 2007, SIGCOMM '07.
[16] Jacques Stern,et al. Almost Uniform Density of Power Residues and the Provable Security of ESIGN , 2003, ASIACRYPT.
[17] Sasu Tarkoma,et al. RTFM: Publish/Subscribe Internetworking Architecture , 2008 .
[18] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[19] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[20] Diana K. Smetters,et al. VoCCN: voice-over content-centric networks , 2009, ReArch '09.
[21] Jennifer Rexford,et al. Floodless in seattle: a scalable ethernet architecture for large enterprises , 2008, SIGCOMM '08.
[22] R. Arief Setyawan. Networking Named Content , 2013 .
[23] Mats Näslund,et al. The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.
[24] Van Jacobson,et al. TCP Extensions for High Performance , 1992, RFC.
[25] Jeff Parker. Recommendations for Interoperable IP Networks using Intermediate System to Intermediate System (IS-IS) , 2004, RFC.
[26] Charles E. Perkins,et al. Service Location Protocol , 1997, RFC.
[27] Hari Balakrishnan,et al. The design and implementation of an intentional naming system , 1999, SOSP.
[28] Ion Stoica,et al. ROFL: routing on flat labels , 2006, SIGCOMM '06.
[29] David Mazières,et al. Separating key management from file system security , 1999, SOSP.
[30] V. Jacobson,et al. Securing Network Content , 2009 .
[31] Jean-Philippe Vasseur,et al. Intermediate System to Intermediate System (IS-IS) Extensions for Advertising Router Information , 2007, RFC.
[32] Stephen Farrell,et al. Delay- and Disruption-Tolerant Networking , 2006, IEEE Internet Computing.