Whenever possible, the bibliography includes stable hypertext links to the references cited.
[IEEE802.11] | LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE, 1999. |
[IEEE802.1d] | LAN/MAN Standards Committee of the IEEE Computer Society, IEEE Standard for Local and metropolitan area networks Media Access Control (MAC) Bridges , IEEE Std 802.1DTM-2004, 2004, |
[IEEE802.1q] | LAN/MAN Standards Committee of the IEEE Computer Society, IEEE Standard for Local and metropolitan area networks— Virtual Bridged Local Area Networks, 2005, |
[IEEE802.2] | IEEE 802.2-1998 (ISO/IEC 8802-2:1998), IEEE Standard for Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements--Part 2: Logical Link Control. Available from http://standards.ieee.org/getieee802/802.2.html |
[IEEE802.3] | LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 3 : Carrier Sense multiple access with collision detection (CSMA/CD) access method and physical layer specification. IEEE, 2000. Available from http://standards.ieee.org/getieee802/802.3.html |
[IEEE802.5] | LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements--Part 5: Token Ring Access Method and Physical Layer Specification. IEEE, 1998. available from http://standards.ieee.org/getieee802 |
[IEEE802] | IEEE, Std 802-2001 : IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, Available from http://standards.ieee.org/getieee802/download/802-2001.pdf |
[ACO+2006] | Augustin, B., Cuvellier, X., Orgogozo, B., Viger, F., Friedman, T., Latapy, M., Magnien, C., Teixeira, R., Avoiding traceroute anomalies with Paris traceroute, Internet Measurement Conference, October 2006, See also http://www.paris-traceroute.net/ |
[AM2019] | Anderson, B. and McGrew, D., 2019, October. TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior. In Proceedings of the Internet Measurement Conference (pp. 379-392). ACM. |
[AS2004] | Androutsellis-Theotokis, S. and Spinellis, D.. .. 2004. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys 36, 4 (December 2004), 335-371. |
[ATLAS2009] | Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, J. and Jahanian, F., Internet inter-domain traffic. In Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM (SIGCOMM '10). ACM, New York, NY, USA, 75-86. |
[AW05] | Arlitt, M. and Williamson, C. 2005. An analysis of TCP reset behaviour on the Internet. SIGCOMM Computer Communication Review 35, 1 (Jan. 2005), 37-44. |
[Abramson1970] | Abramson, N., THE ALOHA SYSTEM: another alternative for computer communications. In Proceedings of the November 17-19, 1970, Fall Joint Computer Conference (Houston, Texas, November 17 - 19, 1970). AFIPS '70 (Fall). ACM, New York, NY, 281-285. |
[B1989] | Berners-Lee, T., Information Management: A Proposal, March 1989 |
[BE2007] | Biondi, P. and A. Ebalard, IPv6 Routing Header Security, CanSecWest Security Conference 2007, April 2007. |
[BF1995] | Bonomi, F. and Fendick, K.W., The rate-based flow control framework for the available bit rate ATM service, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages : 25-39 |
[BMO2006] | Bhatia, M., Manral, V., Ohara, Y., IS-IS and OSPF Difference Discussions, work in progress, Internet draft, Jan. 2006 |
[BNT1997] | Beech, W., Nielsen, D., Taylor, J., AX.25 Link Access Protocol for Amateur Packet Radio, version 2.2, Revision: July 1998 |
[BOP1994] | Brakmo, L. S., O'Malley, S. W., and Peterson, L. L., TCP Vegas: new techniques for congestion detection and avoidance. In Proceedings of the Conference on Communications Architectures, Protocols and Applications (London, United Kingdom, August 31 - September 02, 1994). SIGCOMM '94. ACM, New York, NY, 24-35. |
[BH2013] | Bormann, C., Hoffman, P., Concise Binary Object Representation (CBOR), RFC7049 2013. See also https://cbor.io |
[BS2005] |
|
[Bush1945] | Bush, V. As we may think The Atlantic Monthly 176 (July 1945), pp. 101–108 |
[Bush1993] | Bush, R., FidoNet: technology, tools, and history. Communications ACM 36, 8 (Aug. 1993), 31-35. |
[Bux1989] | Bux, W., Token-ring local-area networks and their performance, Proceedings of the IEEE, Vol 77, No 2, p. 238-259, Feb. 1989 |
[BYL2008] | Buford, J., Yu, H., Lua, E.K., P2P Networking and Applications, Morgan Kaufmann, 2008 |
[CCB+2013] | Cardwell, N., Cheng, Y., Brakmo, L., Mathis, M., Raghavan, B., Dukkipati, N., Chu, H., Terzis, A., and Herbert, T., packetdrill: scriptable network stack testing, from sockets to packets. In Proceedings of the 2013 USENIX conference on Annual Technical Conference (USENIX ATC'13). USENIX Association, Berkeley, CA, USA, 213-218. |
[CCG+2016] | Cardwell, N., Cheng, Y., Gunn, S., Hassas Yeganeh, S. and Jacobson, J., BBR: Congestion-Based Congestion Control. Queue 14, 5, Pages 50 (October 2016) |
[CD2008] | Calvert, K., Donahoo, M., TCP/IP Sockets in Java : Practical Guide for Programmers, Morgan Kaufman, 2008 |
[CJ1989] | Chiu, D., Jain, R., Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks, Computer Networks and ISDN Systems Vol 17, pp 1-14, 1989 |
[CNPI09] | Gont, F., Security Assessment of the Transmission Control Protocol (TCP),Security Assessment of the Transmission Control Protocol (TCP), Internet draft, work in progress, Jan. 2011 |
[COZ2008] | Chi, Y., Oliveira, R., Zhang, L., Cyclops: The Internet AS-level Observatory, ACM SIGCOMM Computer Communication Review (CCR), October 2008 |
[CSP2009] | Carr, B., Sury, O., Palet Martinez, J., Davidson, A., Evans, R., Yilmaz, F., Wijte, Y., IPv6 Address Allocation and Assignment Policy, RIPE document ripe-481, September 2009 |
[Clark88] | Clark D., The Design Philosophy of the DARPA Internet Protocols, Computer Communications Review 18:4, August 1988, pp. 106-114 |
[Comer1988] | Comer, D., Internetworking with TCP/IP : principles, protocols & architecture, Prentice Hall, 1988 |
[Cohen1980] | Cohen, D., On Holy Wars and a Plea for Peace, IEN 137, April 1980, http://www.ietf.org/rfc/ien/ien137.txt |
[CWE444] | CWE-444, Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling'), https://cwe.mitre.org/data/definitions/444.html |
[DC2009] | Donahoo, M., Calvert, K., TCP/IP Sockets in C: Practical Guide for Programmers , Morgan Kaufman, 2009 |
[DH1976] | Diffie, W., Hellman, M., New directions in cryptography, in Information Theory, IEEE Transactions on , vol.22, no.6, pp.644-654, Nov 1976, https://dx.doi.org/10.1109/TIT.1976.1055638 |
[DIX] | Digital, Intel, Xerox, The Ethernet: a local area network: data link layer and physical layer specifications. SIGCOMM Computer Communication Review 11, 3 (Jul. 1981), 20-66. |
[DKF+2007] | Dimitropoulos, X., Krioukov, D., Fomenkov, M., Huffaker, B., Hyun, Y., Claffy, K., Riley, G., AS Relationships: Inference and Validation, ACM SIGCOMM Computer Communication Review (CCR), Jan. 2007 |
[DP1981] | Dalal, Y. K. and Printis, R. S., 48-bit absolute internet and Ethernet host numbers. In Proceedings of the Seventh Symposium on Data Communications (Mexico City, Mexico, October 27 - 29, 1981). SIGCOMM '81. ACM, New York, NY, 240-245. |
[DRC+2010] | Dukkipati, N., Refice, T., Cheng, Y., Chu, J., Herbert, T., Agarwal, A., Jain, A., Sutin, N., An Argument for Increasing TCP's Initial Congestion Window, ACM SIGCOMM Computer Communications Review, vol. 40 (2010), pp. 27-33 |
[Dubuisson2000] |
|
[DR2002] | Daemen, J., Rijmen, V., The Design of Rijndael: AES – The Advanced Encryption Standard Springer, 2002. ISBN 3-540-42580-2. |
[DYGU2004] | Davik, F. Yilmaz, M. Gjessing, S. Uzun, N., IEEE 802.17 resilient packet ring tutorial, IEEE Communications Magazine, Mar 2004, Vol 42, N 3, p. 112-118 |
[Dijkstra1959] | Dijkstra, E., A Note on Two Problems in Connection with Graphs. Numerische Mathematik, 1:269- 271, 1959 |
[Wikipedia:Dijkstra] | Wikipedia, Dijkstra's algorithm |
[eTLS2018] | ETSI, TS 103 533-3, v 1.1.1, CYBER: Middlebox Security Protocol; Part 3: Profile for enterprise network and data center access control, Oct. 2018 |
[Fletcher1982] | Fletcher, J., An Arithmetic Checksum for Serial Transmissions, Communications, IEEE Transactions on, Jan. 1982, Vol. 30, N. 1, pp. 247-252 |
[FFEB2005] | Francois, P., Filsfils, C., Evans, J., and Bonaventure, O., Achieving sub-second IGP convergence in large IP networks. SIGCOMM Computer Communication Review 35, 3 (Jul. 2005), 35-44. |
[FJ1993] | Sally Floyd and Van Jacobson. 1993. Random early detection gateways for congestion avoidance. IEEE/ACM Transactions Networking 1, 4 (August 1993), 397-413. |
[FJ1994] | Floyd, S., and Jacobson, V., The Synchronization of Periodic Routing Messages, IEEE/ACM Transactions on Networking, V.2 N.2, p. 122-136, April 1994 |
[FKC1996] | Freier, A., Karlton, P., Kocher, C., The SSL Protocol Version 3.0, Internet draft, November 1996, https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00 |
[FRT2002] | Fortz, B. Rexford, J. ,Thorup, M., Traffic engineering with traditional IP routing protocols, IEEE Communication Magazine, October 2002 |
[FTY99] | Theodore Faber, Joe Touch, and Wei Yue, The TIME-WAIT state in TCP and Its Effect on Busy Servers, Proceedings INFOCOM'99, pp. 1573 |
[Feldmeier95] | Feldmeier, D. C., Fast software implementation of error detection codes. IEEE/ACM Transactions Networking 3, 6 (Dec. 1995), 640-651. |
[GAVE1999] | Govindan, R., Alaettinoglu, C., Varadhan, K., Estrin, D., An Architecture for Stable, Analyzable Internet Routing, IEEE Network Magazine, Vol. 13, No. 1, pp. 29--35, January 1999 |
[GC2000] | Grier, D., Campbell, M., A social history of Bitnet and Listserv, 1985-1991, Annals of the History of Computing, IEEE, Volume 22, Issue 2, Apr-Jun 2000, pp. 32 - 41 |
[Genilloud1990] | Genilloud, G., X.400 MHS: first steps towards an EDI communication standard. SIGCOMM Computer Communication Review 20, 2 (Apr. 1990), 72-86. |
[Greenwald2014] |
|
[GGR2001] | Gao, L., Griffin, T., Rexford, J., Inherently safe backup routing with BGP, Proceedings IEEE INFOCOM, April 2001 |
[GN2011] | Gettys, J., Nichols, K., Bufferbloat: dark buffers in the internet. Communications of the ACM 55, no. 1 (2012): 57-65. |
[GR2001] | Gao, L., Rexford, J., Stable Internet routing without global coordination, IEEE/ACM Transactions on Networking, December 2001, pp. 681-692 |
[GSW2002] | Griffin, T. G., Shepherd, F. B., and Wilfong, G., The stable paths problem and interdomain routing. IEEE/ACM Transactions Networking 10, 2 (Apr. 2002), 232-243 |
[GW1999] | Griffin, T. G. and Wilfong, G., An analysis of BGP convergence properties. SIGCOMM Computer Communication Review 29, 4 (Oct. 1999), 277-288. |
[Garcia1993] | Garcia-Lunes-Aceves, J., Loop-Free Routing Using Diffusing Computations, IEEE/ACM Transactions on Networking, Vol. 1, No, 1, Feb. 1993 |
[Gast2002] | Gast, M., 802.11 Wireless Networks : The Definitive Guide, O'Reilly, 2002 |
[Gill2004] | Gill, V. , Lack of Priority Queuing Considered Harmful, ACM Queue, December 2004 |
[Goralski2009] | Goralski, W., The Illustrated network : How TCP/IP works in a modern network, Morgan Kaufmann, 2009 |
[Helme2019] | Helme, S., Top 1 Million Analysis - September 2019, 2019, https://scotthelme.co.uk/top-1-million-analysis-september-2019/ |
[HRX2008] | Ha, S., Rhee, I., and Xu, L., CUBIC: a new TCP-friendly high-speed TCP variant. SIGOPS Operating Systems Review 42, 5 (Jul. 2008), 64-74. |
[HV2008] | Hogg, S. Vyncke, E., IPv6 Security, Cisco Press, 2008 |
[IMHM2013] | Ishihara, K., Mukai, M., Hiromi, R., Mawatari, M., Packet Filter and Route Filter Recommendation for IPv6 at xSP routers, 2013 |
[Jacobson1988] | Jacobson, V., Congestion avoidance and control. In Symposium Proceedings on Communications Architectures and Protocols (Stanford, California, United States, August 16 - 18, 1988). V. Cerf, Ed. SIGCOMM '88. ACM, New York, NY, 314-329. |
[Jain1990] | Jain, R., Congestion control in computer networks : Issues and trends, IEEE Network Magazine, May 1990, pp. 24-30 |
[JSBM2002] | Jung, J., Sit, E., Balakrishnan, H., and Morris, R. 2002. DNS performance and the effectiveness of caching. IEEE/ACM Transactions Networking 10, 5 (Oct. 2002), 589-603. |
[JSON-RPC2] | JSON-RPC Working group, JSON-RPC 2.0 Specification, available on http://www.jsonrpc.org, 2010 |
[Kerrisk2010] | Kerrisk, M., The Linux Programming Interface, No Starch Press, 2010 |
[KM1995] | Kent, C. A. and Mogul, J. C., Fragmentation considered harmful. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 75-87. |
[KMS2017] | Krombholz, K., Mayer, W., Schmiedecker, M. and Weippl, E., 2017. " I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS. In 26th {USENIX} Security Symposium ({USENIX} Security 17) (pp. 1339-1356). |
[KNT2013] | Kühlewind, M., Neuner, S., Trammell, B., On the state of ECN and TCP Options on the Internet. Proceedings of the 14th Passive and Active Measurement conference (PAM 2013), Hong Kong, March 2013 |
[KP91] | Karn, P. and Partridge, C., Improving round-trip time estimates in reliable transport protocols. ACM Transactions Computer Systems 9, 4 (Nov. 1991), 364-373. |
[KPD1985] | Karn, P., Price, H., Diersing, R., Packet radio in amateur service, IEEE Journal on Selected Areas in Communications, 3, May, 1985 |
[KPS2003] | Kaufman, C., Perlman, R., and Sommerfeld, B. DoS protection for UDP-based protocols. In Proceedings of the 10th ACM Conference on Computer and Communications Security (Washington D.C., USA, October 27 - 30, 2003). CCS '03. ACM, New York, NY, 2-7. |
[KPS2002] | Kaufman, C., Perlman, R., Speciner, M., Network Security : Private communication in a public world, 2nd edition, Prentice Hall, 2002 |
[KR1995] | Kung, N.T. Morris, R., Credit-based flow control for ATM networks, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages: 40-48 |
[KR2001] | Krishnamurthy, B. and Rexford, J., Web Protocols and Practice: HTTP/1.1, Networking Protocols, Caching, and Traffic Measurement, Addison Wesley, 2001 |
[KRA2018] | Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K.G., Vallina-Rodriguez, N. and Caballero, J., 2018, October. Coming of age: A longitudinal study of TLS deployment. In Proceedings of the Internet Measurement Conference 2018 (pp. 415-428). ACM. |
[KT1975] | Kleinrock, L., Tobagi, F., Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and their Throughput-Delay Characteristics, IEEE Transactions on Communications, Vol. COM-23, No. 12, pp. 1400-1416, December 1975. |
[KW2009] | Katz, D., Ward, D., Bidirectional Forwarding Detection, RFC 5880, June 2010 |
[KZ1989] | Khanna, A. and Zinky, J. 1989. The revised ARPANET routing metric. SIGCOMM Computer Communication Review 19, 4 (Aug. 1989), 45-56. |
[KuroseRoss09] | Kurose J. and Ross K., Computer networking : a top-down approach featuring the Internet, Addison-Wesley, 2009 |
[Lamport1981] | Lamport, L., Password authentication with insecure communication. Communications ACM 24, 11 (November 1981), 770-772. |
[LCP2005] | Eng Keong Lua, Crowcroft, J., Pias, M., Sharma, R., Lim, S., A survey and comparison of peer-to-peer overlay network schemes, Communications Surveys & Tutorials, IEEE, Volume: 7 , Issue: 2, 2005, pp. 72-93 |
[LeB2009] | Leroy, D. and O. Bonaventure, Preparing network configurations for IPv6 renumbering, International Journal of Network Management, 2009 |
[LFJLMT] | Leffler, S., Fabry, R., Joy, W., Lapsley, P., Miller, S., Torek, C., An Advanced 4.4BSD Interprocess Communication Tutorial, 4.4 BSD Programmer's Supplementary Documentation |
[Leboudec2008] | Leboudec, J.-Y., Rate Adaptation Congestion Control and Fairness : a tutorial, Dec. 2008 |
[MAB2008] | McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J., OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review. 2008 Mar 31;38(2):69-74. |
[MRR1979] | McQuillan, J. M., Richer, I., and Rosen, E. C., An overview of the new routing algorithm for the ARPANET. In Proceedings of the Sixth Symposium on Data Communications (Pacific Grove, California, United States, November 27 - 29, 1979). SIGCOMM '79. ACM, New York, NY, 63-68. |
[MRR1980] | McQuillan, J.M., Richer, I., Rosen, E., The New Routing Algorithm for the ARPANET Communications, IEEE Transactions on , vol.28, no.5, pp.711,719, May 1980 |
[MSMO1997] | Mathis, M., Semke, J., Mahdavi, J., and Ott, T. 1997. The macroscopic behavior of the TCP congestion avoidance algorithm. SIGCOMM Computer Communication Review 27, 3 (Jul. 1997), 67-82. |
[MUF+2007] | Mühlbauer, W., Uhlig, S., Fu, B., Meulle, M., and Maennel, O., In search for an appropriate granularity to model routing policies. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Kyoto, Japan, August 27 - 31, 2007). SIGCOMM '07. ACM, New York, NY, 145-156. |
[Malkin1999] | Malkin, G., RIP: An Intra-Domain Routing Protocol, Addison Wesley, 1999 |
[Metcalfe1976] | Metcalfe R., Boggs, D., Ethernet: Distributed packet-switching for local computer networks. Communications of the ACM, 19(7):395--404, 1976. |
[Mills2006] | Mills, D.L., Computer Network Time Synchronization: the Network Time Protocol. CRC Press, March 2006, 304 pp. |
[Mogul1995] | Mogul, J. , The case for persistent-connection HTTP. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols For Computer Communication (Cambridge, Massachusetts, United States, August 28 - September 01, 1995). D. Oran, Ed. SIGCOMM '95. ACM, New York, NY, 299-313. |
[MoR2004] | Modadugu, N. and Rescorla, E., 2004, February. The Design and Implementation of Datagram TLS. In NDSS. |
[Moy1998] | Moy, J., OSPF: Anatomy of an Internet Routing Protocol, Addison Wesley, 1998 |
[MVV2011] | Menezes, A., van Oorschot, P. and Vanstone, S. , Handbook of Applied Cryptography , CRC Press, 2011 |
[Myers1998] | Myers, B. A., A brief history of human-computer interaction technology. interactions 5, 2 (Mar. 1998), 44-54. |
[Nelson1965] | Nelson, T. H., Complex information processing: a file structure for the complex, the changing and the indeterminate. In Proceedings of the 1965 20th National Conference (Cleveland, Ohio, United States, August 24 - 26, 1965). L. Winner, Ed. ACM '65. ACM, New York, NY, 84-100. |
[NSS2010] | Nygren E, Sitaraman RK, Sun J., The Akamai network: a platform for high-performance Internet applications. ACM SIGOPS Operating Systems Review. 2010 Aug 17;44(3):2-19. |
[Paxson99] | Paxson, V. , End-to-end Internet packet dynamics. SIGCOMM Computer Communication Review 27, 4 (Oct. 1997), 139-152. |
[Perlman1985] | Perlman, R., An algorithm for distributed computation of a spanning tree in an extended LAN. SIGCOMM Computer Communication Review 15, 4 (September 1985), 44-53. |
[Perlman2000] | Perlman, R., Interconnections : Bridges, routers, switches and internetworking protocols, 2nd edition, Addison Wesley, 2000 |
[PHG2013] | Prado, A., Harris, N., and Y. Gluck, The BREACH Attack , 2013, <http://breachattack.com/>. |
[Rago1993] | Rago, S., UNIX System V network programming, Addison Wesley, 1993 |
[Rescorla2015] | Rescorla, E., Stanford Seminar - The TLS 1.3 protocol, Nov. 2015 |
[Ristic2015] | Ristic, I., Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Web Servers and Applications, Feisty Duck, 2015 |
[RJ1995] | Ramakrishnan, K. K. and Jain, R., A binary feedback scheme for congestion avoidance in computer networks with a connectionless network layer. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 138-156. |
[RSA1978] | Rivest, R., Shamir, A. and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Communications ACM 21, 2 (February 1978), 120-126 |
[RY1994] | Ramakrishnan, K.K. and Henry Yang, The Ethernet Capture Effect: Analysis and Solution, Proceedings of IEEE 19th Conference on Local Computer Networks, MN, Oct. 1994. |
[Roberts1975] | Roberts, L., ALOHA packet system with and without slots and capture. SIGCOMM Computer Communication Review 5, 2 (Apr. 1975), 28-42. |
[Ross1989] | Ross, F., An overview of FDDI: The fiber distributed data interface, IEEE J. Selected Areas in Comm., vol. 7, no. 7, pp. 1043-1051, Sept. 1989 |
[Russel06] | Russell A., Rough Consensus and Running Code and the Internet-OSI Standards War, IEEE Annals of the History of Computing, July-September 2006 |
[SARK2002] | Subramanian, L., Agarwal, S., Rexford, J., Katz, R.. .. Characterizing the Internet hierarchy from multiple vantage points. In IEEE INFOCOM, 2002 |
[Schneier1996] | Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Wiley, 1996 |
[Sechrest] | Sechrest, S., An Introductory 4.4BSD Interprocess Communication Tutorial, 4.4BSD Programmer's Supplementary Documentation |
[SG1990] | Scheifler, R., Gettys, J., X Window System: The Complete Reference to Xlib, X Protocol, ICCCM, XLFD, X Version 11, Release 4, Digital Press |
[SGP98] | Stone, J., Greenwald, M., Partridge, C., and Hughes, J., Performance of checksums and CRC's over real data. IEEE/ACM Transactions Networking 6, 5 (Oct. 1998), 529-543. |
[SH1980] | Shoch, J. F. and Hupp, J. A., Measured performance of an Ethernet local network. Communications ACM 23, 12 (Dec. 1980), 711-721. |
[SH2004] | Senapathi, S., Hernandez, R., Introduction to TCP Offload Engines, March 2004 |
[SMM1998] | Semke, J., Mahdavi, J., and Mathis, M., Automatic TCP buffer tuning. SIGCOMM Computer Communication Review 28, 4 (Oct. 1998), 315-323. |
[SFR2004] | Stevens R. and Fenner, and Rudoff, A., UNIX Network Programming: The sockets networking API, Addison Wesley, 2004 |
[Sklower89] | Sklower, K. 1989. Improving the efficiency of the OSI checksum calculation. SIGCOMM Computer Communication Review 19, 5 (Oct. 1989), 32-43. |
[SMASU2012] | Sarrar, N., Maier, G., Ager, B., Sommer, R. and Uhlig, S., Investigating IPv6 traffic, Passive and Active Measurements, Lecture Notes in Computer Science vol 7192, 2012, pp.11-20 |
[Stallings2009] | Stallings, W., Protocol Basics: Secure Shell Protocol, Internet Protocol Journal, vol 12, n 4, Dec. 2009 |
[Stevens1994] | Stevens, R., TCP/IP Illustrated : the Protocols, Addison-Wesley, 1994 |
[Stevens1998] | Stevens, R., UNIX Network Programming, Volume 1, Second Edition: Networking APIs: Sockets and XTI, Prentice Hall, 1998 |
[SV1995] |
|
[TKU2019] | Turkovic, B., Kuipers, F., Uhlig, S., Fifty Shades of Congestion Control: A Performance and Interactions Evaluation CoRR abs/1903.03852 (2019) |
[Thomborson1992] | Thomborson, C., The V.42bis Standard for Data-Compressing Modems, IEEE Micro, September/October 1992 (vol. 12 no. 5), pp. 41-53 |
[Unicode] | The Unicode Consortium. The Unicode Standard, Version 5.0.0, defined by: The Unicode Standard, Version 5.0 (Boston, MA, Addison-Wesley, 2007 |
[VPD2004] | Vasseur, J., Pickavet, M., and Demeester, P., Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS. Morgan Kaufmann Publishers Inc., 2004 |
[Varghese2005] | Varghese, G., Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, Morgan Kaufmann, 2005 |
[Vyncke2007] | Vyncke, E., Paggen, C., LAN Switch Security: What Hackers Know About Your Switches, Cisco Press, 2007 |
[WBK2014] | Wang XS, Balasubramanian A, Krishnamurthy A, Wetherall D. How Speedy is SPDY ? . In 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14) 2014 (pp. 387-399). |
[WMS2004] | White, R., Mc Pherson, D., Srihari, S., Practical BGP, Addison-Wesley, 2004 |
[WF2003] | Wessels, D., Fomenkov, M., Wow, That's a lot of packets, Passive and Active Network Measurement Workshop (PAM), Apr 2003 |
[Williams1993] | Williams, R. A painless guide to CRC error detection algorithms, August 1993, unpublished manuscript, https://web.archive.org/web/20060101004751/http://www.ross.net/crc/download/crc_v3.txt |
[WMSS2019] | Ware, R., Mukerjee, M., Seshan, S. and Sherry, J. Modeling BBR's Interactions with Loss-Based Congestion Control. In Proceedings of the Internet Measurement Conference (IMC '19). ACM, New York, NY, USA, 137-143. |
[X200] | ITU-T, recommendation X.200, Open Systems Interconnection - Model and Notation, 1994 |
[Ylonen1996] | Ylonen, T., SSH — Secure Login Connections over the Internet, Usenix Security 1996 |
[ZWH2018] | Zimmermann T., Wolters B., Hohlfeld O., Wehrle K. Is the web ready for HTTP/2 server push? , Proceedings of the 14th International Conference on emerging Networking Experiments and Technologies 2018 Dec 4 (pp. 13-19). ACM. |
[Zimmermann80] | Zimmermann, H., OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol. 28, no. 4, April 1980, pp. 425 - 432. |
[Zakon] | Zakon, R., Hobbes Internet Timeline, online, https://www.zakon.org/robert/internet/timeline/ |
[Zhe2017] | Zheng, X., Phishing with Unicode Domains, April 14, 2017, https://www.xudongz.com/blog/2017/idn-phishing/ |
.. spelling:: Abley Aboba Abramson Aceves Adleman Agarwal Ager Alaettinoglu Allman Androutsellis Aoun Arends Arkko Arlitt Augustin Austein Aviel Bagnulo Balakrishnan Bansal Bao Baran Beijnum Bellovin Bellovin Benvenuti Berners Bertsekas Bhatia Biondi Blanton Blunk Boggs Bonomi Borenstein Borman Bormann Braden Bradner Brakmo Briscoe Burleigh Bux Byrnes Callon Cardwell Casner Cheng Cheswick Chiu Chu Claffy Coltun Conta Crispin Crocker Crowcroft Culler Cuvellier Daemen Dalal Davik Deering Degermark Delany Delgrossi Demeester Deutsch Diersing Diffie Dimitropoulos Donahoo Donnet Doraswamy Draves Droms Dubuisson Duerst Dukkipati Dunkels Ebalard Egevang Eichin Estrin Evarts Faber Fabry Fairhurst Faltstrom Fanto Feinler Feldmeier Fendick Fenner Fenton Filsfils Fomenkov Fortz Freier Frystyk Fu Gallager Gao Gast Genilloud Gerich Gettys Gjessing Goerzen Gont Goralski Govindan Goyret Greenwald Grier Groot Grossman Guttman Haberman Haddadi Hallam Halpern Handley Harrenstien Haskins Heffner Hinden Hiromi Hogg Hong Hopps Hornig Hostetler Huffaker Huitema Hupp Hutzler Hyun Iekel Ishihara Iyengar Jahanian Jesup Jinmei Jonsson Josefsson Kaashoek Kahn Kantor Karels Karger Karlton Karn Karrenberg Katz Kauffman Kaufmann Kaycee Kempf Keong Kerrisk Kessens Khanna Kleinrock Klensin Ko Kocher Kohler Kosters Krioukov Krishnan Kristol Ksinant Kung Kurose Kushalnagar Kühlewind Labovitz Lakshman Lamport Lapsley Larzon Latapy Lau Laubach Leboudec Leffler Leiner Levkowetz Libbey Licklider Lidl Lilley Lim Lindem Lonvick Loreto Lua Lucek Luciani Lunes Luotonen Maennel Magnien Mahdavi Maier Malis Malkin Mamakos Mankin Manral Masinter Mathematik Mawatari Mc McPherson Melnikov Menezes Metcalfe Meulle Michaelson Minei Minnear Miyakawa Mockapteris Molle Montulli Moskowitz Moy Mukai Mühlbauer Nagle Narten Neidhardt Neuner Neville Nikander Nordgren Nordmark Nostrand Numerische O'Malley O'Reilly Oberheide Ohara Oliveira Oorschot Oreilly Orgogozo Ott Overell Paggen Palet Papadimitriou Paxson Pease Pelletier Perlman Pherson Pias Pickavet Piscitello Plotz Plummer Postel Pouzin Printis Prudhommeaux Raghavan Rago Raiciu Ramakrishnan Redlich Refice Rekhter Resnick Retana Rexford Rijmen Risjsighani Ristic Rivest Rochlis Romanow Romkey Rosen Rosen Rudoff Sandlund Sangli Sarrar Savola Scharf Scheifler Schneier Schulzrinne Scudder Sechrest Seifert Selinger Semke Senapathi Senie Seo Shamir Sharma Shoch Shostak Shreedhar Sidhu Silverman Simeborski Sklower Sohraby Soliman Sommer Sommerfeld Souissi Speciner Spinellis Springer Sridharan Srihari Srisuresh Stahl Stallings Stigge Stoica Stoll Su Subramanian Sury Sutin Teixeira Terpstra Terzis Teunis Thaler Theotokis Thomborson Thorup Tobagi Torek Torgerson Townsley Traina Trammell Tsirtsis Tsuchiya Tuexen Uhlig Uhlig Usenix Uzun Vanstone Varada Varadhan Varghese Vasseur Vegoda Venetsanopoulos Viger Villamizar Viswanathan Vollbrecht Volz Vyncke Waitzman Waserman Welzl Wessels Wijte Wilfong Wimer Wium Xu Yilmaz Ylonen Yourtchenko Yu Yue Zawinski Zhang Zill Zimmermann Zinky de nd th Zakon Zheng Parulkar Shenker Wolters Hohlfeld Wehrle Krishnamurthy Nygren Sitaraman Balasubramanian Wetherall Helme Krombholz Schmiedecker Kotzias Razaghpanah Amann Vallina Gluck Weippl Modadugu Rescorla Gunn Hassas Yeganeh Turkovic Kuipers Mukerjee Seshan Malley