<--- Back to Details
First PageDocument Content
Internet protocols / Routing / Border Gateway Protocol / IP hijacking / Tor / Transmission Control Protocol / Internet / Network architecture / Computing
Date: 2013-05-19 18:59:25
Internet protocols
Routing
Border Gateway Protocol
IP hijacking
Tor
Transmission Control Protocol
Internet
Network architecture
Computing

Proving the Impossible with Alibi Protocols Dave Levin Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee, Bo Han, John Douceur, Jacob Lorch, Thomas Moscibroda

Add to Reading List

Source URL: www.cyber.umd.edu

Download Document from Source Website

File Size: 1,12 MB

Share Document on Facebook

Similar Documents