14th IEEE International Conference on Network Protocols (PDF)
External reviewers (PDF)
Forensic Analysis for Epidemic Attacks in Federated Networks (Abstract)
Internet Cache Pollution Attacks and Countermeasures (Abstract)
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks (Abstract)
14th IEEE International Conference on Network Protocols (PDF)
14th IEEE International Conference on Network Protocols (PDF)
Copyright page (PDF)
Table of Contents (PDF)
Heterogeneous Congestion Control: Efficiency, Fairness and Design (Abstract)
Throughput Guaranteed Restorable Routing Without Traffic Prediction (Abstract)
Committees (PDF)
Chunkyspread: Heterogeneous Unstructured Tree-Based Peer-to-Peer Multicast (Abstract)
Key Grids: A Protocol Family for Assigning Symmetric Keys (Abstract)
High Speed Pattern Matching for Network IDS/IPS (Abstract)
Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks (Abstract)
Forensic Analysis for Epidemic Attacks in Federated Networks (Abstract)
Internet Cache Pollution Attacks and Countermeasures (Abstract)
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks (Abstract)
Impact of Routing Metrics on Path Capacity in Multirate and Multihop Wireless Ad Hoc Networks (Abstract)
Reducing Congestion Effects in Wireless Networks by Multipath Routing (Abstract)
Robust Path-Vector Routing Despite Inconsistent Route Preferences (Abstract)
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL (Abstract)
Heterogeneous Congestion Control: Efficiency, Fairness and Design (Abstract)
Throughput Guaranteed Restorable Routing Without Traffic Prediction (Abstract)
O-MAC: A Receiver Centric Power Management Protocol (Abstract)
On the Practical and Security Issues of Batch Content Distribution Via Network Coding (Abstract)
Vault: A Secure Binding Service (Abstract)
Key Grids: A Protocol Family for Assigning Symmetric Keys (Abstract)
High Speed Pattern Matching for Network IDS/IPS (Abstract)
Virtual Surrounding Face Geocasting with Guaranteed Message Delivery for Ad Hoc and Sensor Networks (Abstract)
Benefit-based Data Caching in Ad Hoc Networks (Abstract)
RAIN: A Reliable Wireless Network Architecture (Abstract)
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design (Abstract)
Modeling and Caching of Peer-to-Peer Traffic (Abstract)
Characterizing and Mitigating Inter-domain Policy Violations in Overlay Routes (Abstract)
Robust Path-Vector Routing Despite Inconsistent Route Preferences (Abstract)
Differentiated BGP Update Processing for Improved Routing Convergence (Abstract)
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes (Abstract)
Robust Egress Interdomain Traffic Engineering (Abstract)
O-MAC: A Receiver Centric Power Management Protocol (Abstract)
Dynamic Conflict-free Query Scheduling for Wireless Sensor Networks (Abstract)
Cross-Layer Exploitation of MAC Layer Diversity in Wireless Networks (Abstract)
Author Index (PDF)