Sciweavers

2562 search results - page 83 / 513
» An Internet without the Internet protocol
Sort
View
CCR
2008
75views more  CCR 2008»
13 years 10 months ago
Removing exponential backoff from TCP
The well-accepted wisdom is that TCP's exponential backoff mechanism, introduced by Jacobson 20 years ago, is essential for preserving the stability of the Internet. In this ...
Amit Mondal, Aleksandar Kuzmanovic
CCR
2005
65views more  CCR 2005»
13 years 10 months ago
The IETF, the IRTF, and the networking research community
Some in the research community perceive the Internet Engineering Task Force (IETF) as ossified and see the difficulty in standardizing new protocols as an indication that there is...
Aaron Falk
IJNSEC
2008
146views more  IJNSEC 2008»
13 years 10 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
CN
2000
72views more  CN 2000»
13 years 10 months ago
Security issues in control, management and routing protocols
Abstract-- The TCP/IP suite, the basis for today's Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-...
Madalina Baltatu, Antonio Lioy, Fabio Maino, Danie...
CONEXT
2006
ACM
14 years 4 months ago
Using forgetful routing to control BGP table size
Running the Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, consumes a large amount of memory. A BGP-speaking router typically stores one or more rou...
Elliott Karpilovsky, Jennifer Rexford