Network layer

Results: 1811



#Item
1Computing / Information and communications technology / Computer networking / Data transmission / Network performance / Internet architecture / Teletraffic / Telecommunications engineering / Packet loss / Packet forwarding / Transmission Control Protocol / Traffic flow

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer Chen Chen Daniele E. Asoni

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
2Cryptocurrencies / Blockchains / Concurrent computing / Computing / Hashgraph / Distributed ledger / Ethereum / Hedera / NEO / Smart contract / Draft:Hedera Hashgraph

Hedera: A Governing Council & Public Hashgraph Network The trust layer of the internet Leemon Baird, Mance Harmon, and Paul Madsen w h i t e pa p e r   V.1 . 4    L a s t u p d at e d 1 7 O C T   SU B J

Add to Reading List

Source URL: www.hedera.com

Language: English - Date: 2018-10-17 22:19:08
3Computing / Information and communications technology / Data transmission / Computer networking / Network performance / Routing / Internet architecture / Teletraffic / Packet loss / Packet forwarding / Transmission Control Protocol / Traffic flow

arXiv:1802.08415v1 [cs.CR] 23 FebTARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer Chen Chen

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-02-25 20:30:14
4Cryptocurrencies / Decentralization / Bitcoin / Computing / Contract law / Information / Blockchain / Data / Business ethics / Contract / Economy

THE LEGAL LAYER FOR A NETWORKED WORLD Published on 25 April 2018 Version: 1.0

Add to Reading List

Source URL: agreements.network

Language: English - Date: 2018-09-17 12:27:40
5Computing / Network architecture / Data transmission / Internet Standards / Internet protocols / Computer networking / Network performance / Units of information / Transmission Control Protocol / QUIC / Network address translation / User Datagram Protocol

A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols Mirja K¨uhlewind∗ , Tobias B¨uhler∗ , Brian Trammell∗ , Stephan Neuhaus† , Roman M¨untener† , and Gorry Fairhurst‡ ∗ ETH

Add to Reading List

Source URL: nsg.ee.ethz.ch

Language: English - Date: 2017-11-30 09:02:54
6

The Second Bitcoin Whitepaper vsDraft for Public Comment) Introduction Summary We claim that the existing bitcoin network can be used as a protocol layer, on top of which new currency

Add to Reading List

Source URL: bravenewcoin.com

Language: English - Date: 2016-12-19 22:34:45
    7

    BSafe.network Layer 2 Technology Competition Call for proposal and rules of competition December 8, 2017 BSafe.network 1. Background of BSafe.network affiliated competition series and reasons for holding layer 2 competit

    Add to Reading List

    Source URL: bsafe.network

    Language: English - Date: 2018-07-08 11:07:12
      8

      Intro to Onion Routing Sphinx: A Compact and Provably Secure Mix Format HORNET: High-speed Onion Routing at the Network Layer Forward Secrecy Security Assumptions Future Directions

      Add to Reading List

      Source URL: scalingbitcoin.org

      Language: English - Date: 2016-10-08 10:07:33
        9

        Amiko Pay Experiences Working on Layer 2 Scalability Solutions Corné Plooy A network of channels

        Add to Reading List

        Source URL: scalingbitcoin.org

        Language: English - Date: 2016-09-27 13:58:46
          10

          ANGEL - Automated Network Games Enhancement Layer Jason But, Nigel Williams, Sebastian Zander, Lawrence Stewart and Grenville Armitage Centre for Advanced Internet Architectures Swinburne University of Technology

          Add to Reading List

          Source URL: caia.swin.edu.au

          Language: English - Date: 2010-09-09 01:11:40
            UPDATE