KAMOUN, F., and KLEINROCK, L. (Камоун и Клейнрок): «Stochastic Performance Evaluation of Hierarchical Routing for Large Networks», Computer Networks, vol. 3, pp. 337–353, Nov. 1979.
KARAGIANNIS, V., VENITO, A., COELHO, R., BORKOWSKI, M, and FOHLER, G. (Карагианнис и др.): «Edge Computing with Peer to Peer Interactions: Use Cases and Impact», Proc. Workshop on Fog Computing and the IoT, ACM, pp. 46–50, Apr. 2019.
KARN, P. (Карн): «MACA—A New Channel Access Protocol for Packet Radio», ARRL/CRRL Amateur Radio Ninth Computer Networking Conf., pp. 134–140, 1990.
KARN, P. and PARTRIDGE, C. (Карн и Партридж): «Improving Round-Trip Time Estimates in Reliable Transport Protocols», ACM SIGCOMM Computer Commun. Review, ACM, pp. 2–7, 1987.
KASIM, A. (Касим): «Delivering Carrier Ethernet: Extending Ethernet Beyond the LAN», New York: McGraw-Hill, 2008.
KATABI, D., HANDLEY, M., and ROHRS, C. (Катаби и др.): «Congestion Control for High Bandwidth- Delay Product Networks», Proc. SIGCOMM 2002 Conf., ACM, pp. 89–102, 2002.
KATZ, D., and FORD, P.S. (Кац и Форд): «TUBA: Replacing IP with CLNP», IEEE Network Magazine, vol. 7, pp. 38–47, May/June 1993.
KAUFMAN, C., PERLMAN, R., and SPECINER, M. (Кауфман и др.): «Network Security», Upper Saddle River, NJ: Prentice Hall, 2002.
KENT, C., and MOGUL, J. (Кент и Могул): «Fragmentation Considered Harmful», Proc. SIGCOMM ’87 Conf., ACM, pp. 390–401, 1987.
KHANNA, A. and ZINKY, J. (Кханна и Зинки): «The Revised ARPANET Routing Metric», Proc. SIGCOMM ’89 Conf., ACM, pp. 45–56, 1989.
KIM, H., REICH, J., GUPTA, A., SHAHBAZ, M., FEAMSTER, N. and CLARK, R. (Ким и др.): «Kinetic: Verifiable Dynamic Network Control», 12th USENIX Sym. on Networked Systems Design and Implementation, ACM, pp. 59–72, 2015.
KINNEAR, E., MCMANUS, P., and WOOD, C. (Киннир и др.): «Oblivious DNS over HTTPS», IETF Network Working Group Internet Draft, 2019.
KLEINROCK, L. (Клейнрок): «Power and Other Deterministic Rules of Thumb for Probabalistic Problems in Computer Communications», Proc. Int’l Conf. on Commun., pp. 43.1.1– 43.1.10, 1979.
KLEINROCK, L., and TOBAGI, F. (Клейнрок и Тобаги): «Random Access Techniques for Data Transmission over Packet-Switched Radio Channels», Proc. Nat. Computer Conf., pp. 187–201, 1975.
KOHLER, E., HANDLEY, H., and FLOYD, S. (Колер и др.): «Designing DCCP: Congestion Control without Reliability», Proc. SIGCOMM 2006 Conf., ACM, pp. 27–38, 2006.
KOOPMAN, P. (Купман): «32-Bit Cyclic Redundancy Codes for Internet Applications», Proc. Intl. Conf. on Dependable Systems and Networks., IEEE, pp. 459–472, 2002.
KRAFT, J, and WASHINGTON, L. (Крафт и Вашингтон): «An Introduction to Number Theory with Cryptography», 2nd ed., London: Chapman and Hall, 2018.
KUMAR, R. (Кумар): «All about Steganography and Detection of Stegano Images», Riga, Latvia: Lap Lambert Academic Publishing, 2018.
KUROSE, J., and ROSS, K. (Куросе и Росс): «Computer Networking: A Top-Down Approach», 7th ed. Upper Saddle River, NJ: Pearson, 2016.
KUSZYK, A., and HAMMOUDEH, M. (Кушик и Хаммудех): «Contemporary Alternatives to Traditional Processor Design in the Post Moore’s Law Era», Proc. Second Int’l Conf. on Future Networks and Distributed Systems, ACM, Art. 46, 2018.
LABOVITZ, C., AHUJA, A., BOSE, A., and JAHANIAN, F. (Лейбовиц и др.): «Delayed Internet Routing Convergence», IEEE/ACM Trans. on Networking, vol. 9, pp. 293–306, June 2001.
LAINO, J. (Лайно): «The Telecom Handbook», New York: CMP Books, 2017.
LAM, C.K. M., and TAN, B.C. Y. (Лам и Тан): «The Internet Is Changing the Music Industry», Commun. of the ACM, vol. 44, pp. 62–66, Aug. 2001.
LAMPARTER, O., FANG, L., BISCHOFF, J.-C., REITMANN, M., SCHWENDENER, R., ZASOWSKI, T. (Лампартер и др.): «Multi-Gigabit over Copper Access Networks: Architectural Evolution and Techno-Economic Analysis», IEEE Commun. Magazine, vol. 57, pp. 22–27, Aug. 2019.
LE FEUVRE, J., CONCOLATO, C., BOUZAKARIA, N., and NGUYEN, V. (Ле Февр и др.): «MPEG-DASH for Low Latency and Hybrid Streaming Services», Proc. 23rd Int’l conf. on Multimedia, ACM, pp. 751–752, June 2015.
LEMON, J. (Лемон): «Resisting SYN Flood DOS Attacks with a SYN Cache», Proc. BSDCon Conf., USENIX, pp. 88–98, 2002.
LEVY, S. (Леви): «Crypto Rebels», Wired, pp. 54–61, May/June 1993.
LI, B., WANG, Z., LIU, J., and ZHU, W. (Ли и др.): «Two Decades of Internet Video Streaming: A Retrospective View», ACM Trans. on Multimedia Computing, vol. 9, Art. 33, Oct. 2013.
LI, M., AGRAWAL, D., GANESAN, D., and VENKATARAMANI, A. (Ли и др.): «Block-Switched Networks: A New Paradigm for Wireless Transport», Proc. NSDI 2009 Conf., USENIX, pp. 423–436, 2009.
LI, Z., LEVIN, D., SPRING, N., and BHATTACHARJEE, B. (Ли и др.): «Internet Anycast: Performance, Problems, and Potential», Proc. SIGCOMM 2018 Conf., pp. 59–73, Aug. 2018.
LIN, S., and COSTELLO, D. (Линь и Костелло): «Error Control Coding», 2nd ed., Upper Saddle River, NJ: Pearson Education, 2004.
LIOGKAS, N., NELSON, R., KOHIER, E., ZHANG, L. Exploiting BitTorrent for fun (but not profit), 2006.
LUBACZ, J., MAZURCZYK, W., and SZCZYPIORSKI, K. (Любач и др.): «Vice over IP», IEEE Spectrum, pp. 42–47, Feb. 2010.
MCKEOWN, N., ANDERSON, T., BALAKRISHNAN, H., PARULKAR, G., PETERSON, L., REXFORD, J., SHENKER, S. and TURNER, J. (Маккиоун и др.): «OpenFlow: Enabling Innovation in Campus Networks», Computer Commun. Review, vol. 38, pp. 69–74, Apr. 2008.
MACEDONIA, M.R. (Македония): «Distributed File Sharing», IEEE Computer, vol. 33, pp. 99–101, 2000.
MALIS, A., and SIMPSON, W. (Малис и Симпсон): «PPP over SONET/SDH», RFC 2615, June 1999.
MANGLA, T., HALEPOVIC, E., AMMAR, M. and ZEGURA, E. (Мангла и др.): «eMIMIC: Estimating HTTP-Based Video QoE Metrics from Encrypted Network Traffic», Network Traffic Measurement and Analysis Conf., IEEE, pp. 1–8, 2018.
MASSEY, J.L. (Мэсси): «Shift-Register Synthesis and BCH Decoding», IEEE Trans. on Information Theory, vol. IT-5, pp. 122–127, Jan. 1969.
MATSUI, M. (Мацуи): «Linear Cryptanalysis Method for DES Cipher», Advances in Cryptology — Eurocrypt 1993 Proceedings, Springer-Verlag LNCS 765, pp. 386–397, 1994.
MAZIERES, D., and KAASHOEK, M.F. (Мазьер и Каашук): «The Design, Implementation, and Operation of an Email Pseudonym Server», Proc. Fifth Conf. on Computer and Commun. Security, ACM, pp. 27–36, 1998.
MCCULLOUGH, B. (Маккалоу): «How the Internet Happened: From Netscape to the iPhone», New York: Liveright, 2018.
MENASCHE, D.S., ROCHA, D.A., ANTONIO, A., LI, B., TOWSLEY, D. and VENKATARAMANI, A. (Менаше и др.): «Content Availability and Bundling in Swarming Systems», IEEE/ACM Trans. on Networking, IEEE, pp. 580–593, 2013.
MENEZES, A.J., and VANSTONE, S.A. (Менезес и Ванстоун): «Elliptic Curve Cryptosystems and Their Implementation», Journal of Cryptology, vol. 6, pp. 209–224, 1993.
MERKLE, R.C., and HELLMAN, M. (Меркл и Хеллман): «Hiding and Signatures in Trapdoor Knapsacks», IEEE Trans. on Information Theory, vol. IT-4, pp. 525–530, Sept. 1978.
METCALFE, R.M. (Меткалф): «Metcalfe’s Law after 40 Years of Ethernet», IEEE Computer, vol. 46, pp. 26–31, 2013.
METCALFE, R.M. (Меткалф): «Computer/Network Interface Design: Lessons from Arpanet and Ethernet», IEEE J. on Selected Areas in Commun., vol. 11, pp. 173–179, Feb. 1993.
METCALFE, R.M., and BOGGS, D.R. (Меткалф и Боггс): «Ethernet: Distributed Packet Switching for Local Computer Networks», Commun. of the ACM, vol. 19, pp. 395–404, July 1976.
METZ, C. (Мец): «Interconnecting ISP Networks», IEEE Internet Computing, vol. 5, pp. 74–80, Mar.–Apr. 2001.
MISHRA, P.P., KANAKIA, H., and TRIPATHI, S. (Мишра и др.): «On Hop by Hop Rate-Based Congestion Control», IEEE/ACM Trans. on Networking, vol. 4, pp. 224–239, Apr. 1996.
MITRA, J., and NAYAK, T. (Митра и Найек): «Reconfigurable Very High Throughput Low Latency VLSI (FPGA Design Architecture of CRC 32», Integration, vol. 56, pp. 1–14, Jan. 2017.
MOGUL, J. (Могул): «IP Network Performance», in Internet System Handbook, D.C. Lynch and M.Y. Rose (eds.), Boston: Addison-Wesley, pp. 575–575, 1993.
MOGUL, J., and DEERING, S. (Могул и Диринг): «Path MTU Discovery», RFC 1191, Nov. 1990.
MOGUL, J., and MINSHALL, G. (Могул и Миншалл): «Rethinking the Nagle Algorithm», Comput. Commun. Rev., vol. 31, pp. 6–20, Jan. 2001.
MOY, J. (Мой): «Multicast Routing Extensions for OSPF», Commun. of the ACM, vol. 37, pp. 61–66, Aug. 1994.
MUYCO, S.D., and HERNANDEZ, A.A. (Муйко и Эрнандес): «Least Significant Bit Hash Algorithm for Digital Image Watermarking Authentication», Proc. Fifth Int’l Conf. on Computing and Art. Intell, ACM, pp. 150–154, 2019.
NAGLE, J. (Нейгл): «On Packet Switches with Infinite Storage», IEEE Trans. on Commun., vol. COM-5, pp. 435–438, Apr. 1987.
NAGLE, J.: «Congestion Control in TCP/IP Internetworks», Computer Commun. Rev., vol. 14, pp. 11–17, Oct. 1984.
NAUGHTON, J. (Нотон): «A Brief History of the Future», Woodstock, NY: Overlook Press, 2000.
NEEDHAM, R.M., and SCHROEDER, M.D. (Нидхем и Шредер): «Authentication Revisited», Operating Systems Rev., vol. 21, p. 7, Jan. 1987.
NEEDHAM, R.M., and SCHROEDER, M.D. (Нидхем и Шредер): «Using Encryption for Authentication in Large Networks of Computers», Commun. of the ACM, vol. 21, pp. 993–999, Dec. 1978.
NELAKUDITI, S., and ZHANG, Z.-L. (Нелакудити и Чжан): «A Localized Adaptive Proportioning Approach to QoS Routing», IEEE Commun. Magazine, vol. 40, pp. 66–71, June 2002.
NIST: «Secure Hash Algorithm», U.S. Government Federal Information Processing Standard 180, 1993.
NORTON, W.B. (Нортон): «The Internet Peering Playbook: Connecting to the Core of the Internet», DrPeering Press, 2011.
NUCCI, A., and PAPAGIANNAKI, D. (Нуччи и Пападжаннаки): «Design, Measurement and Management of Large-Scale IP Networks», Cambridge: Cambridge University Press, 2008.