Литмир - Электронная Библиотека

SALTZER, J.H., REED, D.P., and CLARK, D.D.: “End-to-End Arguments in System Design,” ACM Trans, on Computer Systems, vol. 2, pp. 277-288, Nov. 1984.

SCHALLER, R.: “Moore’s Law: Past, Present and Future,’’ IEEE Spectrum, vol. 34, pp. 52-59, June 1997.

SCHNEIER, B.: Secrets and Lies, New York: John Wiley&Sons, 2004.

SCHNEIER, B.: E-Mail Security, New York: John Wiley&Sons, 1995.

SCHNORR, C.P.: “Efficient Signature Generation for Smart Cards,” Journal of Cryptol-ogy, vol. 4, pp. 161-174, 1991.

SCHOLTZ, R.A.: “The Origins of Spread-Spectrum Communications,” IEEE Trans, on Commun., vol. COM-0, pp. 822-854, May 1982.

SCHWARTZ, M., and ABRAMSON, N.: “The AlohaNet: Surfing for Wireless Data,’’ IEEE Commun. Magazine, vol. 47, pp. 21-25, Dec. 2009.

SEIFERT, R.., and EDWARDS, J.: The All-New Switch Book, NY: John Wiley, 2008.

SENN, J.A.: “The Emergence of M-Commerce,’’ IEEE Computer, vol. 33, pp. 148-150, Dec. 2000.

SERJANTOV, A.: ‘Anonymizing Censorship Resistant Systems,” Proc. First Int’l Workshop on Peer-to-Peer Systems, London: Springer-Verlag LNCS 2429, pp. 111-120, 2002.

SHACHAM, N., and MCKENNY, P.: “Packet Recovery in High-Speed Networks Using Coding and Buffer Management,’’ Proc. INFOCOM Conf., IEEE, pp. 124-131, June 1990.

SHAIKH, A., REXFORD, J., and SHIN, K.: “Load-Sensitive Routing of Long-Lived IP Flows,’’ Proc. SIGCOMM ’99 Conf., ACM, pp. 215-226, Sept. 1999.

SHALUNOV, S., and CARLSON, R.: “Detecting Duplex Mismatch on Ethernet,’’ Passive and Active Network Measurement, Berlin: Springer-Verlag LNCS 3431, pp. 3135-3148, 2005.

SHANNON, C.: “A Mathematical Theory of Communication,” Bell System Tech. J., vol. 27, pp. 379-423, July 1948; and pp. 623-656, Oct. 1948.

SHEPARD, S.: SONET/SDH Demystified, New York: McGraw-Hill, 2001.

SHREEDHAR, M., and VARGHESE, G.: “Efficient Fair Queueing Using Deficit Round Robin,” Proc. SIGCOMM ‘95 Conf., ACM, pp. 231-243, 1995.

SIMPSON, W.: Video Over IP, 2nd ed., Burlington, MA: Focal Press, 2008.

SIMPSON, W.: “PPP in HDLC-like Framing,’’ RFC 1662, July 1994b.

SIMPSON, W.: “The Point-to-Point Protocol (PPP),’’ RFC 1661, July 1994a.

SIU, K., andJAIN, R.: “A Brief Overview of ATM: Protocol Layers, LAN Emulation, and Traffic,” ACM Computer Communications Review, vol. 25, pp. 6-20, Apr. 1995.

SKOUDIS, E. and LISTON, T.: Counter Hack Reloaded, 2nd ed., Upper Saddle River, NJ: Prentice Hall, 2006.

SMITH, O.K., and ALEXANDER, R.C.: Fumbling the Future, New York: William Morrow, 1988.

SNOEREN, A.C., andBALAKRISHNAN, H.: “An End-to-End Approach to Host Mobility,” Intel Conf. on Mobile Computing and Networking, ACM, pp. 155-166, 2000.

SOBEL, D.L.: “Will Carnivore Devour Online Privacy,” Computer, vol. 34, pp. 87-88, May 2001.

SOTIROV, A., STEVENS, M., APPELBAUM, J., LENSTRA, A., MOLNAR, D., OSVIK, D., and DE WEGER, B.: “MD5 Considered Harmful Today,’’ Proc. 25th Chaos Communication Congress, Verlag Art d’Ameublement, 2008.

SOUTHEY, R.: The Doctors, London: Longman, Brown, Green and Longmans, 1848.

SPURGEON, C.E.: Ethernet: The Definitive Guide, Sebastopol, CA: O’Reilly, 2000.

STALLINGS, W.: Data and Computer Communications, 9th ed., Upper Saddle River, NJ: Pearson Education, 2010.

STEVENS, W.R.: TCP/IP Illustrated, TheProtocols, Boston: Addison-Wesley, 1994.

STINSON, D.R.: Cryptography Theory and Practice, 2nd ed., Boca Raton, FL: CRC Press, 2002.

STOICA, I., MORRIS, R., KARGER, D., KAASHOEK, M.F., and BALAKRISHNAN, H.: “Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications,” Proc. SIGCOMM 2001 Conf., ACM, pp. 149-160, 2001.

STUBBLEFIELD, A., IOANNIDIS, J., and RUBIN, A.D.: “Using the Fluhrer, Mantin, and Shamir Attack to Break WEP,” Proc Network and Distributed Systems Security Symp., ISOC, pp. 1-11,2002.

STUTTARD, D., and PINTO, M.: The Web Application Hacker’s Handbook, New York John Wiley & Sons, 2007.

SU, S.: The UMTS Air Interface in RF Engineering, New York: McGraw-Hill, 2007.

SULLIVAN, G., and WIEGAND, T.: ‘‘Tree Algorithms for Packet Broadcast Channels,’ Proc. of the IEEE, vol. 93, pp. 18-31, Jan. 2005.

SUNSHINE, C.A., and DALAL, Y.K.: “Connection Management in Transport Protocols,” Computer Networks, vol. 2, pp. 454-473, 1978.

TAN, K, SONG, J, ZHANG, Q,, and SRIDHARN, M.: “A Compound TCP Approach for High-Speed and Long Distance Networks,’’ Proc. INFOCOM Conf., IEEE, pp. 1-12, 2006.

ТАНЕНБАУМ, Э. Современные операционные системы. 3-е изд. — СПб.: Питер, 2010.

TANENBAUM, A.S., and VAN STEEN, M.: Distributed Systems: Principles and Paradigms, Upper Saddle River, NJ: Prentice Hall, 2007.

TOMLINSON, R.S.: “Selecting Sequence Numbers,” Proc. SIGCOMM/SIGOPS Interprocess Commun. Workshop, ACM, pp. 11-23, 1975.

TUCHMAN, W.: “Hellman Presents No Shortcut Solutions to DES,” IEEE Spectrum, vol. 16, pp. 40-41, July 1979.

TURNER,J.S.: “New Directions in Communications (or Which Way to the Information Age),” IEEE Commun. Magazine, vol. 24, pp 8-15, Oct. 1986.

UNGERBOECK, G.: ‘‘Trellis-Coded Modulation with Redundant Signal Sets Part I: Introduction,” IEEE Commun. Magazine, vol. 25, pp. 5-11, Feb. 1987.

VALADE, J.,: PHP & MySQL for Dummies, 5th ed., New York: John Wiley & Sons, 2009.

VARGHESE, G.: Network Algorithmics, San Francisco: Morgan Kaufmann, 2004.

VARGHESE, G., andLAUCK, T.: “Hashed and Hierarchical Timing Wheels: Data Structures for the Efficient Implementation of a Timer Facility,” Proc. llth Symp. on Operating Systems Prin., ACM, pp. 25-38, 1987.

VERIZON BUSINESS: 2009 Data Breach Investigations Report, Verizon, 2009.

VITERBI, A.: CDMA: Principles of Spread Spectrum Communication, Englewood Cliffs, NJ: Prentice Hall, 1995.

VON AHN, L., BLUM, B., and LANGFORD, J.: “Telling Humans and Computers Apart Automatically,’’ Commun. of the ACM, vol. 47, pp. 56-60, Feb. 2004.

WAITZMAN, D., PARTRIDGE, C., andDEERING, S.: “Distance Vector Multicast Routing Protocol,’’ RFC 1075, Nov. 1988.

WALDMAN, M, RUBIN, A.D., and CRANOR, L.F.: “Publius: A Robust, Tamper-Evident, Censorship-Resistant, Web Publishing System,” Proc. Ninth USEN1X Security Symp., USENIX, pp. 59-72, 2000.

WANG, Z., and CROWCROFT, J.: “SEAL Detects Cell Misordering,’’ IEEE Network Magazine, vol. 6, pp. 8-9, July 1992.

WANT, R.: RFID Explained, San Rafael, CA: Morgan Claypool, 2006.

WARNEKE, B., LAST, M., LIEBOWITZ, B., and PISTER, K.SJ.: “Smart Dust: Communicating with a Cubic Millimeter Computer,” Computer, vol. 34, pp. 44-51, Jan. 2001.

WAYNER, P.: Disappearing Cryptography: Information Hiding, Steganography, and Watermarking, 3nded., San Francisco: Morgan Kaufmann, 2008.

WEI, D, CHENG, J,, LOW, S., and HEGDE, S.: “FAST TCP: Motivation, Architecture, Algorithms, Performance,’’ IEEE/ACM Trans. on Networking, vol. 14, pp. 1246-1259, Dec. 2006.

WEISER, M.: “The Computer for the Twenty-First Century,’’ Scientific American, vol. 265, pp. 94-104, Sept. 1991.

WELBOURNE, E., BATTLE, L., COLE, G., GOULD, K., RECTOR, K., RAYMER, S., BALAZINSKA, M., andBORRIELLO, G.: “Building the Internet of Things Using RFID,’’ IEEE Internet Computing, vol. 13, pp. 48-55, May 2009.

WITTENBURG, N.: Understanding Voice Over IP Technology, Clifton Park, NY: Delmar Cengage Learning, 2009.

WOLMAN, A., VOELKER, G., SHARMA, N., CARDWELL, N., KARLIN, A., and LEVY, H.: “On the Scale and Performance of Cooperative Web Proxy Caching,’’ Proc. 17th Symp. on Operating Systems Prin., ACM, pp. 16-31, 1999.

318
{"b":"639789","o":1}