You are here

Bibliography

Export 4 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is autonomous systems  [Clear All Filters]
2009
Edman M, Syverson P. AS-awareness in Tor path selection. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 380–389. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653708
2005
Feamster N, Balakrishnan H. Detecting BGP configuration faults with static analysis. In: NSDI'05: Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation. NSDI'05: Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation. Berkeley, CA, USA: USENIX Association; 2005. pp. 43–56. Available from: http://portal.acm.org/citation.cfm?id=1251207#
Kutzner K, Fuhrmann T. Towards Autonomic Networking using Overlay Routing Techniques. In: Proceedings of the 18th International Conference on Architecture of Computing Systems (ARCS '05) - System Aspects in Organic and Pervasive Computing. Proceedings of the 18th International Conference on Architecture of Computing Systems (ARCS '05) - System Aspects in Organic and Pervasive Computing. Innsbruck, Austria: Springer Berlin / Heidelberg; 2005. p. 222?235. Available from: http://i30www.ira.uka.de/research/publications/p2p/
2004
Feamster N, Dingledine R. Location Diversity in Anonymity Networks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Washington, DC, USA; 2004. Available from: http://portal.acm.org/citation.cfm?id=1029199