Back to Results
First PageMeta Content
Network architecture / Internet protocols / Internet standards / Dynamic DNS / Domain Name System Security Extensions / DNSCurve / Universal Plug and Play / Name server / Content delivery network / Computing / Domain name system / Internet


Lost In the Edge: Finding Your Way With Signposts Charalampos Rotsos, Heidi Howard, David Sheets, Richard Mortier1 Anil Madhavapeddy, Amir Chaudhry, Jon Crowcroft University of Cambridge, 1 University of Nottingham Abst
Add to Reading List

Open Document

File Size: 133,06 KB

Share Result on Facebook

City

London / /

Company

Signpost / Domain Name System / Akamai / Amazon / Privacy Enhancing Technologies / LogMeIn / Content Delivery Networks / M. S. AND C LARK D. D. / /

Country

India / United States / /

Facility

Jon Crowcroft University of Cambridge / library OSes / Related Work Building / P. Identity trail / University of Nottingham Abstract / L2TP Privoxy Multipath TCP tunnel / /

IndustryTerm

online account / excellent tools / end-hosts exposes network / Internet abstraction / Internet protocols / Internet connectivity / Internet services / private devices / Internet-connected devices / highperformance internet applications / endpoint identifiers using gossip protocols / resolution infrastructure / unwanted communications / controlled services / Internet Technology / online identities / point-solution / authenticated mechanism to resolve these device / social networking / telecommunications / Internet Architecture / Internet Protocol / heterogeneous and complex edge networks / law enforcement / country-wide internet outages / authoritative name server / virgin media / opensource tools / block services / distributed applications / Internet edge network / library operating systems / cloud services / public and authenticated key infrastructure / origin server / client access software / home networks / simplest solution / Internet measurement / resolver infrastructure / backward compatibility to existing applications / encrypted user communications / 3G network / campus networks / client device / hide devices / tunnel Web proxy Multipath support Table / Internet technologies / Internet Bob / respective devices / online communication / authoritative server / Internet-wide services / enterprise network management / party audio chat services / /

MusicAlbum

Alice / /

OperatingSystem

POSIX / /

Organization

Bob / IMC / U.S. Securities and Exchange Commission / USENIX Association / Rutgers / Bob’s government / Jon Crowcroft University of Cambridge / Economic and Social Commission for Asia and the Pacific / United Nations / University of Nottingham Abstract / /

Person

B ERNSTEIN / David Sheets / Charlie / Bob / Malte Schwarzkopf / Derek McAuley / Tim Harris / Heidi Howard / Anil Madhavapeddy / Marcel Waldvogel / Steven Hand / Nikita Borisov / Alan Mycroft / Amir Chaudhry / /

Position

controller / D. J. / /

Product

Apple iPhone / OSes / /

Technology

top-level domain / API / PKI / Internet technologies / Internet Technology / OpenFlow protocol / secret key / R. IdentifierLocator Network Protocol / access control list / mobile devices / encryption / cryptography / ISP / resurrectingduckling protocol / 3G / Home network / LAN / Public Key Infrastructure / peer-to-peer / IP / audio streaming / VPN / smartphone / P2P / Internet protocols / Plug and Play / UDP / SSL / operating systems / T. Host Identity Protocol / cellular telephone / endpoint identifiers using gossip protocols / public key / home DSL router / firewall / file sharing / http / caching / /

URL

http /

SocialTag