With the rapid evolution and diversification of Internet applications, t...
The current Internet lacks a bandwidth-reservation infrastructure that
e...
Modern DDoS defense systems rely on probabilistic monitoring algorithms ...
Internet service providers (ISPs) have a variety of quality attributes t...
In its current state, the Internet does not provide end users with
trans...
In the years after signing the Paris agreement, corporations have been
e...
The question at which layer network functionality is presented or abstra...
With the application of machine learning to security-critical and sensit...
To protect against naturally occurring or adversely induced congestion i...
Google's BBR is the most prominent result of the recently revived quest ...
Many critical computing applications rely on secure and dependable time ...
This paper presents a security analysis of the InfiniBand architecture, ...
Many systems today rely heavily on virtual private network (VPN) technol...
In various contexts of networking research, end-host path selection has
...
We present F-PKI, an enhancement to the HTTPS public-key infrastructure ...
Path-aware networks (PANs) are emerging as an intriguing new paradigm wi...
To address the rising demand for strong packet delivery guarantees in
ne...
Current probabilistic flow-size monitoring can only detect heavy hitters...
By delegating path control to end-hosts, future Internet architectures o...
Byzantine fault tolerant protocols enable state replication in the prese...
Path selection by selfish agents has traditionally been studied by compa...
User authentication can rely on various factors (e.g., a password, a
cry...
This paper describes BlockPKI, a blockchain-based public-key infrastruct...
The detection of network flows that send excessive amounts of traffic is...
Modern low-latency anonymity systems, no matter whether constructed as a...