Seminar on Internet Technologies (Summer 2010): Difference between revisions

Line 67: Line 67:
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://an.kaist.ac.kr/~mycha/docs/imc126-benevenuto.pdf] [http://www2.research.att.com/~bala/papers/imc09-osnf.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/interaction-eurosys09.pdf]
| [http://an.kaist.ac.kr/~mycha/docs/imc126-benevenuto.pdf] [http://www2.research.att.com/~bala/papers/imc09-osnf.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/interaction-eurosys09.pdf]
|
|-
|-
| Security threats of Online Social Networks
| Security threats of Online Social Networks
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-jan-2010-wpna.pdf]
| [http://www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-jan-2010-wpna.pdf]
|-
| Security and Privacy in Delay Tolerant Networks
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf][https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf][http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf]
|}
|}


55

edits