Back to Results
First PageMeta Content
Forwarding plane / Transmission Control Protocol / Firewall / Internet / Data transmission / Computing / Computer networking / Packet Processing


Network Security Via Explicit Consent Jad Naous∗, Michael Walfish†, David Mazi`eres∗, Antonio Nicolosi‡, and Arun Seehra† ∗Stanford †UT
Add to Reading List

Document Date: 2009-07-17 02:54:51


Open Document

File Size: 396,18 KB

Share Result on Facebook

City

Houston / New York / Los Angeles / /

Company

Intel / the AES / /

Country

United States / /

Facility

Institute of Technology ICING / /

IndustryTerm

topology propagation protocol / real-world operating systems / control plane software / configuration server / inter-domain routing protocols / software router / consent server / secure real-world operating systems / local configuration server / receiver applications / software slow path / broadcast configuration protocol / Internet backbone link speeds / local networking stack / Basic protocol / backbone network / path server / per-packet processing cost / network applications / Internet architecture / x86 processor / Internet core / Web server / course Internet security / public consent server / coexisting inter-domain routing protocols / /

OperatingSystem

Linux / DoS / /

Organization

ASIC / Institute of Technology ICING / DoS / /

Person

David Mazi`eres / Arun Seehra† ∗Stanford / Michael Walfish / Ai / Austin ‡Stevens Abstract / Antonio Nicolosi / /

Position

Private / deep packet inspector / /

Product

PoC / /

Technology

FPGA / virtual machine / RAM / 1.86 GHz processor / transport-layer encryption / Linux / IP router / VPN / x86 processor / private key / operating systems / WAN / topology propagation protocol / broadcast configuration protocol / Ethernet / cryptography / routing protocol / ASIC / software router / public key / DNS / 6 Evaluation The ICING protocol / coexisting inter-domain routing protocols / ISP / caching / IPv4 / Web server / Gigabit Ethernet / /

SocialTag