Skip to content

Latest commit

 

History

History
800 lines (793 loc) · 67 KB

bibliography.rst

File metadata and controls

800 lines (793 loc) · 67 KB

Bibliography

Whenever possible, the bibliography includes stable hypertext links to the references cited.

[IEEE802.11]LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE, 1999.
[IEEE802.1d]LAN/MAN Standards Committee of the IEEE Computer Society, IEEE Standard for Local and metropolitan area networks Media Access Control (MAC) Bridges , IEEE Std 802.1DTM-2004, 2004,
[IEEE802.1q]LAN/MAN Standards Committee of the IEEE Computer Society, IEEE Standard for Local and metropolitan area networks— Virtual Bridged Local Area Networks, 2005,
[IEEE802.2]IEEE 802.2-1998 (ISO/IEC 8802-2:1998), IEEE Standard for Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements--Part 2: Logical Link Control. Available from http://standards.ieee.org/getieee802/802.2.html
[IEEE802.3]LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 3 : Carrier Sense multiple access with collision detection (CSMA/CD) access method and physical layer specification. IEEE, 2000. Available from http://standards.ieee.org/getieee802/802.3.html
[IEEE802.5]LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements--Part 5: Token Ring Access Method and Physical Layer Specification. IEEE, 1998. available from http://standards.ieee.org/getieee802
[IEEE802]IEEE, Std 802-2001 : IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, Available from http://standards.ieee.org/getieee802/download/802-2001.pdf
[ACO+2006]Augustin, B., Cuvellier, X., Orgogozo, B., Viger, F., Friedman, T., Latapy, M., Magnien, C., Teixeira, R., Avoiding traceroute anomalies with Paris traceroute, Internet Measurement Conference, October 2006, See also http://www.paris-traceroute.net/
[AM2019]Anderson, B. and McGrew, D., 2019, October. TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior. In Proceedings of the Internet Measurement Conference (pp. 379-392). ACM.
[AS2004]Androutsellis-Theotokis, S. and Spinellis, D.. .. 2004. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys 36, 4 (December 2004), 335-371.
[ATLAS2009]Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, J. and Jahanian, F., Internet inter-domain traffic. In Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM (SIGCOMM '10). ACM, New York, NY, USA, 75-86.
[AW05]Arlitt, M. and Williamson, C. 2005. An analysis of TCP reset behaviour on the Internet. SIGCOMM Computer Communication Review 35, 1 (Jan. 2005), 37-44.
[Abramson1970]Abramson, N., THE ALOHA SYSTEM: another alternative for computer communications. In Proceedings of the November 17-19, 1970, Fall Joint Computer Conference (Houston, Texas, November 17 - 19, 1970). AFIPS '70 (Fall). ACM, New York, NY, 281-285.
[B1989]Berners-Lee, T., Information Management: A Proposal, March 1989
[BE2007]Biondi, P. and A. Ebalard, IPv6 Routing Header Security, CanSecWest Security Conference 2007, April 2007.
[BF1995]Bonomi, F. and Fendick, K.W., The rate-based flow control framework for the available bit rate ATM service, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages : 25-39
[BMO2006]Bhatia, M., Manral, V., Ohara, Y., IS-IS and OSPF Difference Discussions, work in progress, Internet draft, Jan. 2006
[BNT1997]Beech, W., Nielsen, D., Taylor, J., AX.25 Link Access Protocol for Amateur Packet Radio, version 2.2, Revision: July 1998
[BOP1994]Brakmo, L. S., O'Malley, S. W., and Peterson, L. L., TCP Vegas: new techniques for congestion detection and avoidance. In Proceedings of the Conference on Communications Architectures, Protocols and Applications (London, United Kingdom, August 31 - September 02, 1994). SIGCOMM '94. ACM, New York, NY, 24-35.
[BH2013]Bormann, C., Hoffman, P., Concise Binary Object Representation (CBOR), RFC7049 2013. See also https://cbor.io
[BS2005]
  1. Barrett, R. Silverman, R. Byrnes, SSH: The Secure Shell (The Definitive Guide), O'Reilly 2005 (2nd edition).
[Bush1945]Bush, V. As we may think The Atlantic Monthly 176 (July 1945), pp. 101–108
[Bush1993]Bush, R., FidoNet: technology, tools, and history. Communications ACM 36, 8 (Aug. 1993), 31-35.
[Bux1989]Bux, W., Token-ring local-area networks and their performance, Proceedings of the IEEE, Vol 77, No 2, p. 238-259, Feb. 1989
[BYL2008]Buford, J., Yu, H., Lua, E.K., P2P Networking and Applications, Morgan Kaufmann, 2008
[CCB+2013]Cardwell, N., Cheng, Y., Brakmo, L., Mathis, M., Raghavan, B., Dukkipati, N., Chu, H., Terzis, A., and Herbert, T., packetdrill: scriptable network stack testing, from sockets to packets. In Proceedings of the 2013 USENIX conference on Annual Technical Conference (USENIX ATC'13). USENIX Association, Berkeley, CA, USA, 213-218.
[CCG+2016]Cardwell, N., Cheng, Y., Gunn, S., Hassas Yeganeh, S. and Jacobson, J., BBR: Congestion-Based Congestion Control. Queue 14, 5, Pages 50 (October 2016)
[CD2008]Calvert, K., Donahoo, M., TCP/IP Sockets in Java : Practical Guide for Programmers, Morgan Kaufman, 2008
[CJ1989]Chiu, D., Jain, R., Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks, Computer Networks and ISDN Systems Vol 17, pp 1-14, 1989
[CNPI09]Gont, F., Security Assessment of the Transmission Control Protocol (TCP),Security Assessment of the Transmission Control Protocol (TCP), Internet draft, work in progress, Jan. 2011
[COZ2008]Chi, Y., Oliveira, R., Zhang, L., Cyclops: The Internet AS-level Observatory, ACM SIGCOMM Computer Communication Review (CCR), October 2008
[CSP2009]Carr, B., Sury, O., Palet Martinez, J., Davidson, A., Evans, R., Yilmaz, F., Wijte, Y., IPv6 Address Allocation and Assignment Policy, RIPE document ripe-481, September 2009
[Clark88]Clark D., The Design Philosophy of the DARPA Internet Protocols, Computer Communications Review 18:4, August 1988, pp. 106-114
[Comer1988]Comer, D., Internetworking with TCP/IP : principles, protocols & architecture, Prentice Hall, 1988
[Cohen1980]Cohen, D., On Holy Wars and a Plea for Peace, IEN 137, April 1980, http://www.ietf.org/rfc/ien/ien137.txt
[CWE444]CWE-444, Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling'), https://cwe.mitre.org/data/definitions/444.html
[DC2009]Donahoo, M., Calvert, K., TCP/IP Sockets in C: Practical Guide for Programmers , Morgan Kaufman, 2009
[DH1976]Diffie, W., Hellman, M., New directions in cryptography, in Information Theory, IEEE Transactions on , vol.22, no.6, pp.644-654, Nov 1976, https://dx.doi.org/10.1109/TIT.1976.1055638
[DIX]Digital, Intel, Xerox, The Ethernet: a local area network: data link layer and physical layer specifications. SIGCOMM Computer Communication Review 11, 3 (Jul. 1981), 20-66.
[DKF+2007]Dimitropoulos, X., Krioukov, D., Fomenkov, M., Huffaker, B., Hyun, Y., Claffy, K., Riley, G., AS Relationships: Inference and Validation, ACM SIGCOMM Computer Communication Review (CCR), Jan. 2007
[DP1981]Dalal, Y. K. and Printis, R. S., 48-bit absolute internet and Ethernet host numbers. In Proceedings of the Seventh Symposium on Data Communications (Mexico City, Mexico, October 27 - 29, 1981). SIGCOMM '81. ACM, New York, NY, 240-245.
[DRC+2010]Dukkipati, N., Refice, T., Cheng, Y., Chu, J., Herbert, T., Agarwal, A., Jain, A., Sutin, N., An Argument for Increasing TCP's Initial Congestion Window, ACM SIGCOMM Computer Communications Review, vol. 40 (2010), pp. 27-33
[Dubuisson2000]
  1. Dubuisson, ASN.1 : Communication between Heterogeneous Systems <http://www.oss.com/asn1/resources/books-whitepapers-pubs/asn1-books.html#dubuisson>, Morgan Kauffman, 2000
[DR2002]Daemen, J., Rijmen, V., The Design of Rijndael: AES – The Advanced Encryption Standard Springer, 2002. ISBN 3-540-42580-2.
[DYGU2004]Davik, F. Yilmaz, M. Gjessing, S. Uzun, N., IEEE 802.17 resilient packet ring tutorial, IEEE Communications Magazine, Mar 2004, Vol 42, N 3, p. 112-118
[Dijkstra1959]Dijkstra, E., A Note on Two Problems in Connection with Graphs. Numerische Mathematik, 1:269- 271, 1959
[Wikipedia:Dijkstra]Wikipedia, Dijkstra's algorithm
[eTLS2018]ETSI, TS 103 533-3, v 1.1.1, CYBER: Middlebox Security Protocol; Part 3: Profile for enterprise network and data center access control, Oct. 2018
[Fletcher1982]Fletcher, J., An Arithmetic Checksum for Serial Transmissions, Communications, IEEE Transactions on, Jan. 1982, Vol. 30, N. 1, pp. 247-252
[FFEB2005]Francois, P., Filsfils, C., Evans, J., and Bonaventure, O., Achieving sub-second IGP convergence in large IP networks. SIGCOMM Computer Communication Review 35, 3 (Jul. 2005), 35-44.
[FJ1993]Sally Floyd and Van Jacobson. 1993. Random early detection gateways for congestion avoidance. IEEE/ACM Transactions Networking 1, 4 (August 1993), 397-413.
[FJ1994]Floyd, S., and Jacobson, V., The Synchronization of Periodic Routing Messages, IEEE/ACM Transactions on Networking, V.2 N.2, p. 122-136, April 1994
[FKC1996]Freier, A., Karlton, P., Kocher, C., The SSL Protocol Version 3.0, Internet draft, November 1996, https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00
[FRT2002]Fortz, B. Rexford, J. ,Thorup, M., Traffic engineering with traditional IP routing protocols, IEEE Communication Magazine, October 2002
[FTY99]Theodore Faber, Joe Touch, and Wei Yue, The TIME-WAIT state in TCP and Its Effect on Busy Servers, Proceedings INFOCOM'99, pp. 1573
[Feldmeier95]Feldmeier, D. C., Fast software implementation of error detection codes. IEEE/ACM Transactions Networking 3, 6 (Dec. 1995), 640-651.
[GAVE1999]Govindan, R., Alaettinoglu, C., Varadhan, K., Estrin, D., An Architecture for Stable, Analyzable Internet Routing, IEEE Network Magazine, Vol. 13, No. 1, pp. 29--35, January 1999
[GC2000]Grier, D., Campbell, M., A social history of Bitnet and Listserv, 1985-1991, Annals of the History of Computing, IEEE, Volume 22, Issue 2, Apr-Jun 2000, pp. 32 - 41
[Genilloud1990]Genilloud, G., X.400 MHS: first steps towards an EDI communication standard. SIGCOMM Computer Communication Review 20, 2 (Apr. 1990), 72-86.
[Greenwald2014]
  1. Greenwald, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, Metropolitan books, 2014
[GGR2001]Gao, L., Griffin, T., Rexford, J., Inherently safe backup routing with BGP, Proceedings IEEE INFOCOM, April 2001
[GN2011]Gettys, J., Nichols, K., Bufferbloat: dark buffers in the internet. Communications of the ACM 55, no. 1 (2012): 57-65.
[GR2001]Gao, L., Rexford, J., Stable Internet routing without global coordination, IEEE/ACM Transactions on Networking, December 2001, pp. 681-692
[GSW2002]Griffin, T. G., Shepherd, F. B., and Wilfong, G., The stable paths problem and interdomain routing. IEEE/ACM Transactions Networking 10, 2 (Apr. 2002), 232-243
[GW1999]Griffin, T. G. and Wilfong, G., An analysis of BGP convergence properties. SIGCOMM Computer Communication Review 29, 4 (Oct. 1999), 277-288.
[Garcia1993]Garcia-Lunes-Aceves, J., Loop-Free Routing Using Diffusing Computations, IEEE/ACM Transactions on Networking, Vol. 1, No, 1, Feb. 1993
[Gast2002]Gast, M., 802.11 Wireless Networks : The Definitive Guide, O'Reilly, 2002
[Gill2004]Gill, V. , Lack of Priority Queuing Considered Harmful, ACM Queue, December 2004
[Goralski2009]Goralski, W., The Illustrated network : How TCP/IP works in a modern network, Morgan Kaufmann, 2009
[Helme2019]Helme, S., Top 1 Million Analysis - September 2019, 2019, https://scotthelme.co.uk/top-1-million-analysis-september-2019/
[HRX2008]Ha, S., Rhee, I., and Xu, L., CUBIC: a new TCP-friendly high-speed TCP variant. SIGOPS Operating Systems Review 42, 5 (Jul. 2008), 64-74.
[HV2008]Hogg, S. Vyncke, E., IPv6 Security, Cisco Press, 2008
[IMHM2013]Ishihara, K., Mukai, M., Hiromi, R., Mawatari, M., Packet Filter and Route Filter Recommendation for IPv6 at xSP routers, 2013
[ISO10589]ISO, Intermediate System to Intermediate System intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service (ISO 8473) , 2002
[Jacobson1988]Jacobson, V., Congestion avoidance and control. In Symposium Proceedings on Communications Architectures and Protocols (Stanford, California, United States, August 16 - 18, 1988). V. Cerf, Ed. SIGCOMM '88. ACM, New York, NY, 314-329.
[Jain1990]Jain, R., Congestion control in computer networks : Issues and trends, IEEE Network Magazine, May 1990, pp. 24-30
[JSBM2002]Jung, J., Sit, E., Balakrishnan, H., and Morris, R. 2002. DNS performance and the effectiveness of caching. IEEE/ACM Transactions Networking 10, 5 (Oct. 2002), 589-603.
[JSON-RPC2]JSON-RPC Working group, JSON-RPC 2.0 Specification, available on http://www.jsonrpc.org, 2010
[Kerrisk2010]Kerrisk, M., The Linux Programming Interface, No Starch Press, 2010
[KM1995]Kent, C. A. and Mogul, J. C., Fragmentation considered harmful. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 75-87.
[KMS2017]Krombholz, K., Mayer, W., Schmiedecker, M. and Weippl, E., 2017. " I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS. In 26th {USENIX} Security Symposium ({USENIX} Security 17) (pp. 1339-1356).
[KNT2013]Kühlewind, M., Neuner, S., Trammell, B., On the state of ECN and TCP Options on the Internet. Proceedings of the 14th Passive and Active Measurement conference (PAM 2013), Hong Kong, March 2013
[KP91]Karn, P. and Partridge, C., Improving round-trip time estimates in reliable transport protocols. ACM Transactions Computer Systems 9, 4 (Nov. 1991), 364-373.
[KPD1985]Karn, P., Price, H., Diersing, R., Packet radio in amateur service, IEEE Journal on Selected Areas in Communications, 3, May, 1985
[KPS2003]Kaufman, C., Perlman, R., and Sommerfeld, B. DoS protection for UDP-based protocols. In Proceedings of the 10th ACM Conference on Computer and Communications Security (Washington D.C., USA, October 27 - 30, 2003). CCS '03. ACM, New York, NY, 2-7.
[KPS2002]Kaufman, C., Perlman, R., Speciner, M., Network Security : Private communication in a public world, 2nd edition, Prentice Hall, 2002
[KR1995]Kung, N.T. Morris, R., Credit-based flow control for ATM networks, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages: 40-48
[KR2001]Krishnamurthy, B. and Rexford, J., Web Protocols and Practice: HTTP/1.1, Networking Protocols, Caching, and Traffic Measurement, Addison Wesley, 2001
[KRA2018]Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K.G., Vallina-Rodriguez, N. and Caballero, J., 2018, October. Coming of age: A longitudinal study of TLS deployment. In Proceedings of the Internet Measurement Conference 2018 (pp. 415-428). ACM.
[KT1975]Kleinrock, L., Tobagi, F., Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and their Throughput-Delay Characteristics, IEEE Transactions on Communications, Vol. COM-23, No. 12, pp. 1400-1416, December 1975.
[KW2009]Katz, D., Ward, D., Bidirectional Forwarding Detection, RFC 5880, June 2010
[KZ1989]Khanna, A. and Zinky, J. 1989. The revised ARPANET routing metric. SIGCOMM Computer Communication Review 19, 4 (Aug. 1989), 45-56.
[KuroseRoss09]Kurose J. and Ross K., Computer networking : a top-down approach featuring the Internet, Addison-Wesley, 2009
[Lamport1981]Lamport, L., Password authentication with insecure communication. Communications ACM 24, 11 (November 1981), 770-772.
[LCP2005]Eng Keong Lua, Crowcroft, J., Pias, M., Sharma, R., Lim, S., A survey and comparison of peer-to-peer overlay network schemes, Communications Surveys & Tutorials, IEEE, Volume: 7 , Issue: 2, 2005, pp. 72-93
[LeB2009]Leroy, D. and O. Bonaventure, Preparing network configurations for IPv6 renumbering, International Journal of Network Management, 2009
[LFJLMT]Leffler, S., Fabry, R., Joy, W., Lapsley, P., Miller, S., Torek, C., An Advanced 4.4BSD Interprocess Communication Tutorial, 4.4 BSD Programmer's Supplementary Documentation
[Leboudec2008]Leboudec, J.-Y., Rate Adaptation Congestion Control and Fairness : a tutorial, Dec. 2008
[MAB2008]McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J., OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review. 2008 Mar 31;38(2):69-74.
[MRR1979]McQuillan, J. M., Richer, I., and Rosen, E. C., An overview of the new routing algorithm for the ARPANET. In Proceedings of the Sixth Symposium on Data Communications (Pacific Grove, California, United States, November 27 - 29, 1979). SIGCOMM '79. ACM, New York, NY, 63-68.
[MRR1980]McQuillan, J.M., Richer, I., Rosen, E., The New Routing Algorithm for the ARPANET Communications, IEEE Transactions on , vol.28, no.5, pp.711,719, May 1980
[MSMO1997]Mathis, M., Semke, J., Mahdavi, J., and Ott, T. 1997. The macroscopic behavior of the TCP congestion avoidance algorithm. SIGCOMM Computer Communication Review 27, 3 (Jul. 1997), 67-82.
[MUF+2007]Mühlbauer, W., Uhlig, S., Fu, B., Meulle, M., and Maennel, O., In search for an appropriate granularity to model routing policies. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Kyoto, Japan, August 27 - 31, 2007). SIGCOMM '07. ACM, New York, NY, 145-156.
[Malkin1999]Malkin, G., RIP: An Intra-Domain Routing Protocol, Addison Wesley, 1999
[Metcalfe1976]Metcalfe R., Boggs, D., Ethernet: Distributed packet-switching for local computer networks. Communications of the ACM, 19(7):395--404, 1976.
[Mills2006]Mills, D.L., Computer Network Time Synchronization: the Network Time Protocol. CRC Press, March 2006, 304 pp.
[Mogul1995]Mogul, J. , The case for persistent-connection HTTP. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols For Computer Communication (Cambridge, Massachusetts, United States, August 28 - September 01, 1995). D. Oran, Ed. SIGCOMM '95. ACM, New York, NY, 299-313.
[MoR2004]Modadugu, N. and Rescorla, E., 2004, February. The Design and Implementation of Datagram TLS. In NDSS.
[Moy1998]Moy, J., OSPF: Anatomy of an Internet Routing Protocol, Addison Wesley, 1998
[MVV2011]Menezes, A., van Oorschot, P. and Vanstone, S. , Handbook of Applied Cryptography , CRC Press, 2011
[Myers1998]Myers, B. A., A brief history of human-computer interaction technology. interactions 5, 2 (Mar. 1998), 44-54.
[Nelson1965]Nelson, T. H., Complex information processing: a file structure for the complex, the changing and the indeterminate. In Proceedings of the 1965 20th National Conference (Cleveland, Ohio, United States, August 24 - 26, 1965). L. Winner, Ed. ACM '65. ACM, New York, NY, 84-100.
[NSS2010]Nygren E, Sitaraman RK, Sun J., The Akamai network: a platform for high-performance Internet applications. ACM SIGOPS Operating Systems Review. 2010 Aug 17;44(3):2-19.
[Paxson99]Paxson, V. , End-to-end Internet packet dynamics. SIGCOMM Computer Communication Review 27, 4 (Oct. 1997), 139-152.
[Perlman1985]Perlman, R., An algorithm for distributed computation of a spanning tree in an extended LAN. SIGCOMM Computer Communication Review 15, 4 (September 1985), 44-53.
[Perlman2000]Perlman, R., Interconnections : Bridges, routers, switches and internetworking protocols, 2nd edition, Addison Wesley, 2000
[PHG2013]Prado, A., Harris, N., and Y. Gluck, The BREACH Attack , 2013, <http://breachattack.com/>.
[Rago1993]Rago, S., UNIX System V network programming, Addison Wesley, 1993
[Rescorla2015]Rescorla, E., Stanford Seminar - The TLS 1.3 protocol, Nov. 2015
[Ristic2015]Ristic, I., Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Web Servers and Applications, Feisty Duck, 2015
[RJ1995]Ramakrishnan, K. K. and Jain, R., A binary feedback scheme for congestion avoidance in computer networks with a connectionless network layer. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 138-156.
[RSA1978]Rivest, R., Shamir, A. and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Communications ACM 21, 2 (February 1978), 120-126
[RY1994]Ramakrishnan, K.K. and Henry Yang, The Ethernet Capture Effect: Analysis and Solution, Proceedings of IEEE 19th Conference on Local Computer Networks, MN, Oct. 1994.
[Roberts1975]Roberts, L., ALOHA packet system with and without slots and capture. SIGCOMM Computer Communication Review 5, 2 (Apr. 1975), 28-42.
[Ross1989]Ross, F., An overview of FDDI: The fiber distributed data interface, IEEE J. Selected Areas in Comm., vol. 7, no. 7, pp. 1043-1051, Sept. 1989
[Russel06]Russell A., Rough Consensus and Running Code and the Internet-OSI Standards War, IEEE Annals of the History of Computing, July-September 2006
[SARK2002]Subramanian, L., Agarwal, S., Rexford, J., Katz, R.. .. Characterizing the Internet hierarchy from multiple vantage points. In IEEE INFOCOM, 2002
[Schneier1996]Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Wiley, 1996
[Sechrest]Sechrest, S., An Introductory 4.4BSD Interprocess Communication Tutorial, 4.4BSD Programmer's Supplementary Documentation
[SG1990]Scheifler, R., Gettys, J., X Window System: The Complete Reference to Xlib, X Protocol, ICCCM, XLFD, X Version 11, Release 4, Digital Press
[SGP98]Stone, J., Greenwald, M., Partridge, C., and Hughes, J., Performance of checksums and CRC's over real data. IEEE/ACM Transactions Networking 6, 5 (Oct. 1998), 529-543.
[SH1980]Shoch, J. F. and Hupp, J. A., Measured performance of an Ethernet local network. Communications ACM 23, 12 (Dec. 1980), 711-721.
[SH2004]Senapathi, S., Hernandez, R., Introduction to TCP Offload Engines, March 2004
[SMM1998]Semke, J., Mahdavi, J., and Mathis, M., Automatic TCP buffer tuning. SIGCOMM Computer Communication Review 28, 4 (Oct. 1998), 315-323.
[SFR2004]Stevens R. and Fenner, and Rudoff, A., UNIX Network Programming: The sockets networking API, Addison Wesley, 2004
[Sklower89]Sklower, K. 1989. Improving the efficiency of the OSI checksum calculation. SIGCOMM Computer Communication Review 19, 5 (Oct. 1989), 32-43.
[SMASU2012]Sarrar, N., Maier, G., Ager, B., Sommer, R. and Uhlig, S., Investigating IPv6 traffic, Passive and Active Measurements, Lecture Notes in Computer Science vol 7192, 2012, pp.11-20
[Stallings2009]Stallings, W., Protocol Basics: Secure Shell Protocol, Internet Protocol Journal, vol 12, n 4, Dec. 2009
[Stevens1994]Stevens, R., TCP/IP Illustrated : the Protocols, Addison-Wesley, 1994
[Stevens1998]Stevens, R., UNIX Network Programming, Volume 1, Second Edition: Networking APIs: Sockets and XTI, Prentice Hall, 1998
[SV1995]
  1. Shreedhar and G. Varghese. Efficient fair queueing using deficit round robin SIGCOMM Computer Communication Review 25, 4 (October 1995), 231-242.
[TKU2019]Turkovic, B., Kuipers, F., Uhlig, S., Fifty Shades of Congestion Control: A Performance and Interactions Evaluation CoRR abs/1903.03852 (2019)
[Thomborson1992]Thomborson, C., The V.42bis Standard for Data-Compressing Modems, IEEE Micro, September/October 1992 (vol. 12 no. 5), pp. 41-53
[Unicode]The Unicode Consortium. The Unicode Standard, Version 5.0.0, defined by: The Unicode Standard, Version 5.0 (Boston, MA, Addison-Wesley, 2007
[VPD2004]Vasseur, J., Pickavet, M., and Demeester, P., Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS. Morgan Kaufmann Publishers Inc., 2004
[Varghese2005]Varghese, G., Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, Morgan Kaufmann, 2005
[Vyncke2007]Vyncke, E., Paggen, C., LAN Switch Security: What Hackers Know About Your Switches, Cisco Press, 2007
[WBK2014]Wang XS, Balasubramanian A, Krishnamurthy A, Wetherall D. How Speedy is SPDY ? . In 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14) 2014 (pp. 387-399).
[WMS2004]White, R., Mc Pherson, D., Srihari, S., Practical BGP, Addison-Wesley, 2004
[WF2003]Wessels, D., Fomenkov, M., Wow, That's a lot of packets, Passive and Active Network Measurement Workshop (PAM), Apr 2003
[Williams1993]Williams, R. A painless guide to CRC error detection algorithms, August 1993, unpublished manuscript, https://web.archive.org/web/20060101004751/http://www.ross.net/crc/download/crc_v3.txt
[WMSS2019]Ware, R., Mukerjee, M., Seshan, S. and Sherry, J. Modeling BBR's Interactions with Loss-Based Congestion Control. In Proceedings of the Internet Measurement Conference (IMC '19). ACM, New York, NY, USA, 137-143.
[X200]ITU-T, recommendation X.200, Open Systems Interconnection - Model and Notation, 1994
[Ylonen1996]Ylonen, T., SSH — Secure Login Connections over the Internet, Usenix Security 1996
[ZWH2018]Zimmermann T., Wolters B., Hohlfeld O., Wehrle K. Is the web ready for HTTP/2 server push? , Proceedings of the 14th International Conference on emerging Networking Experiments and Technologies 2018 Dec 4 (pp. 13-19). ACM.
[Zimmermann80]Zimmermann, H., OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol. 28, no. 4, April 1980, pp. 425 - 432.
[Zakon]Zakon, R., Hobbes Internet Timeline, online, https://www.zakon.org/robert/internet/timeline/
[Zhe2017]Zheng, X., Phishing with Unicode Domains, April 14, 2017, https://www.xudongz.com/blog/2017/idn-phishing/
.. spelling::



   Abley
   Aboba
   Abramson
   Aceves
   Adleman
   Agarwal
   Ager
   Alaettinoglu
   Allman
   Androutsellis
   Aoun
   Arends
   Arkko
   Arlitt
   Augustin
   Austein
   Aviel
   Bagnulo
   Balakrishnan
   Bansal
   Bao
   Baran
   Beijnum
   Bellovin
   Bellovin
   Benvenuti
   Berners
   Bertsekas
   Bhatia
   Biondi
   Blanton
   Blunk
   Boggs
   Bonomi
   Borenstein
   Borman
   Bormann
   Braden
   Bradner
   Brakmo
   Briscoe
   Burleigh
   Bux
   Byrnes
   Callon
   Cardwell
   Casner
   Cheng
   Cheswick
   Chiu
   Chu
   Claffy
   Coltun
   Conta
   Crispin
   Crocker
   Crowcroft
   Culler
   Cuvellier
   Daemen
   Dalal
   Davik
   Deering
   Degermark
   Delany
   Delgrossi
   Demeester
   Deutsch
   Diersing
   Diffie
   Dimitropoulos
   Donahoo
   Donnet
   Doraswamy
   Draves
   Droms
   Dubuisson
   Duerst
   Dukkipati
   Dunkels
   Ebalard
   Egevang
   Eichin
   Estrin
   Evarts
   Faber
   Fabry
   Fairhurst
   Faltstrom
   Fanto
   Feinler
   Feldmeier
   Fendick
   Fenner
   Fenton
   Filsfils
   Fomenkov
   Fortz
   Freier
   Frystyk
   Fu
   Gallager
   Gao
   Gast
   Genilloud
   Gerich
   Gettys
   Gjessing
   Goerzen
   Gont
   Goralski
   Govindan
   Goyret
   Greenwald
   Grier
   Groot
   Grossman
   Guttman
   Haberman
   Haddadi
   Hallam
   Halpern
   Handley
   Harrenstien
   Haskins
   Heffner
   Hinden
   Hiromi
   Hogg
   Hong
   Hopps
   Hornig
   Hostetler
   Huffaker
   Huitema
   Hupp
   Hutzler
   Hyun
   Iekel
   Ishihara
   Iyengar
   Jahanian
   Jesup
   Jinmei
   Jonsson
   Josefsson
   Kaashoek
   Kahn
   Kantor
   Karels
   Karger
   Karlton
   Karn
   Karrenberg
   Katz
   Kauffman
   Kaufmann
   Kaycee
   Kempf
   Keong
   Kerrisk
   Kessens
   Khanna
   Kleinrock
   Klensin
   Ko
   Kocher
   Kohler
   Kosters
   Krioukov
   Krishnan
   Kristol
   Ksinant
   Kung
   Kurose
   Kushalnagar
   Kühlewind
   Labovitz
   Lakshman
   Lamport
   Lapsley
   Larzon
   Latapy
   Lau
   Laubach
   Leboudec
   Leffler
   Leiner
   Levkowetz
   Libbey
   Licklider
   Lidl
   Lilley
   Lim
   Lindem
   Lonvick
   Loreto
   Lua
   Lucek
   Luciani
   Lunes
   Luotonen
   Maennel
   Magnien
   Mahdavi
   Maier
   Malis
   Malkin
   Mamakos
   Mankin
   Manral
   Masinter
   Mathematik
   Mawatari
   Mc
   McPherson
   Melnikov
   Menezes
   Metcalfe
   Meulle
   Michaelson
   Minei
   Minnear
   Miyakawa
   Mockapteris
   Molle
   Montulli
   Moskowitz
   Moy
   Mukai
   Mühlbauer
   Nagle
   Narten
   Neidhardt
   Neuner
   Neville
   Nikander
   Nordgren
   Nordmark
   Nostrand
   Numerische
   O'Malley
   O'Reilly
   Oberheide
   Ohara
   Oliveira
   Oorschot
   Oreilly
   Orgogozo
   Ott
   Overell
   Paggen
   Palet
   Papadimitriou
   Paxson
   Pease
   Pelletier
   Perlman
   Pherson
   Pias
   Pickavet
   Piscitello
   Plotz
   Plummer
   Postel
   Pouzin
   Printis
   Prudhommeaux
   Raghavan
   Rago
   Raiciu
   Ramakrishnan
   Redlich
   Refice
   Rekhter
   Resnick
   Retana
   Rexford
   Rijmen
   Risjsighani
   Ristic
   Rivest
   Rochlis
   Romanow
   Romkey
   Rosen
   Rosen
   Rudoff
   Sandlund
   Sangli
   Sarrar
   Savola
   Scharf
   Scheifler
   Schneier
   Schulzrinne
   Scudder
   Sechrest
   Seifert
   Selinger
   Semke
   Senapathi
   Senie
   Seo
   Shamir
   Sharma
   Shoch
   Shostak
   Shreedhar
   Sidhu
   Silverman
   Simeborski
   Sklower
   Sohraby
   Soliman
   Sommer
   Sommerfeld
   Souissi
   Speciner
   Spinellis
   Springer
   Sridharan
   Srihari
   Srisuresh
   Stahl
   Stallings
   Stigge
   Stoica
   Stoll
   Su
   Subramanian
   Sury
   Sutin
   Teixeira
   Terpstra
   Terzis
   Teunis
   Thaler
   Theotokis
   Thomborson
   Thorup
   Tobagi
   Torek
   Torgerson
   Townsley
   Traina
   Trammell
   Tsirtsis
   Tsuchiya
   Tuexen
   Uhlig
   Uhlig
   Usenix
   Uzun
   Vanstone
   Varada
   Varadhan
   Varghese
   Vasseur
   Vegoda
   Venetsanopoulos
   Viger
   Villamizar
   Viswanathan
   Vollbrecht
   Volz
   Vyncke
   Waitzman
   Waserman
   Welzl
   Wessels
   Wijte
   Wilfong
   Wimer
   Wium
   Xu
   Yilmaz
   Ylonen
   Yourtchenko
   Yu
   Yue
   Zawinski
   Zhang
   Zill
   Zimmermann
   Zinky
   de
   nd
   th
   Zakon
   Zheng
   Parulkar
   Shenker
   Wolters
   Hohlfeld
   Wehrle
   Krishnamurthy
   Nygren
   Sitaraman
   Balasubramanian
   Wetherall
   Helme
   Krombholz
   Schmiedecker
   Kotzias
   Razaghpanah
   Amann
   Vallina
   Gluck
   Weippl
   Modadugu
   Rescorla
   Gunn
   Hassas
   Yeganeh
   Turkovic
   Kuipers
   Mukerjee
   Seshan
   Malley