Seminar on Internet Technologies (Winter 2011/2012): Difference between revisions

Line 64: Line 64:
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://lcs.syr.edu/faculty/tang/Teaching/CSE791-Spring11/Papers/VL2-Sigcomm09.pdf]
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://lcs.syr.edu/faculty/tang/Teaching/CSE791-Spring11/Papers/VL2-Sigcomm09.pdf]
|-
|-
| <s>Security and Privacy in Delay Tolerant Networks<s>  ''(taken by Sromona Chatterjee)''
| <s>Security and Privacy in Delay Tolerant Networks</s>  ''(taken by Sromona Chatterjee)''
| <s>[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]<s>
| <s>[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]</s>
| <s>[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf]<s>
| <s>[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf]</s>
|-
|-
| Understanding Android Security
| Understanding Android Security
55

edits