NUGENT, R., MUNAKANA, R., CHIN, A., COELHO, R., and PUIG-SUARI, J. (Ньюджент и др.): «The Cube-Sat: The PicoSatellite Standard for Research and Education», Proc. SPACE 2008 Conf., AIAA, 2008.
OLEJNIK, L., CASTELLUCIA, C., and DIAZ, C. (Олейник и др.): «The Leaking Battery», Data Privacy Management and Security Assurance Springer, pp. 254–263.
ORAN, D. (Оран): «OSI IS-IS Intra-domain Routing Protocol», RFC 1142, Feb. 1990.
OSTERHAGE, W. (Остерхаге): «Wireless Network Security», 2nd ed., Boca Raton, FL: CRC Press, 2018.
OTWAY, D., and REES, O. (Отуэй и Рис): «Efficient and Timely Mutual Authentication», Operating Systems Rev., pp. 8–10, Jan. 1987.
PADHYE, J., FIROIU, V., TOWSLEY, D., and KUROSE, J. (Падхай и др.): «Modeling TCP Throughput: A Simple Model and Its Empirical Validation», Proc. SIGCOMM ’98 Conf., ACM, pp. 303–314, 1998.
PALMER, M., KRUGER, T., CHANDRASEKARAN, N., and FELDMANN, A. (Палмер и др.): «The QUIC Fix for Optimal Video Streaming», Proc. Workshop on Evolution, Performance, and Interoperability of QUIC, ACM, pp. 43–49, Dec. 2018.
PARAMESWARAN, M., SUSARLA, A., and WHINSTON, A.B. (Парамешваран и др.): «P2P Networking: An Information-Sharing Alternative», IEEE Computer, vol. 34, pp. 31–38, July 2001.
PAREKH, A., and GALLAGER, R. (Парех и Галлагер): «A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple-Node Case», IEEE/ACM Trans. on Networking, vol. 2, pp. 137–150, Apr. 1994.
PAREKH, A., and GALLAGER, R.: «A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case», IEEE/ACM Trans. on Networking, vol. 1, pp. 344–357, June 1993.
PARTRIDGE, C., HUGHES, J., and STONE, J. (Партридж и др.): «Performance of Checksums and CRCs over Real Data», Proc. SIGCOMM ’95 Conf., ACM, pp. 68–76, 1995.
PARTRIDGE, C., MENDEZ, T., and MILLIKEN, W. (Партридж и др.): «Host Anycasting Service», RFC 1546, Nov. 1993.
PATIL, P., BUBANE, V., and PANDHARE, N. (Патил и др.): «Audio Steganography», Riga, Latvia: Lap Lambert Academic Publishing, 2019.
PAXSON, V., and FLOYD, S. (Паксон и Флойд): «Wide-Area Traffic: The Failure of Poisson Modeling», IEEE/ACM Trans. on Networking, vol. 3, pp. 226–244, June 1995.
PEARSON, E. (Пирсон): «Fiber Optic Communications For Beginners: The Basics», Fiber Optic Assoc., 2015.
PERKINS, C.E. (Перкинс): «RTP: Audio and Video for the Internet», Boston: Addison-Wesley, 2003.
PERKINS, C.E.: «IP Mobility Support for IPv4», RFC 3344, Aug. 2002.
PERKINS, C.E. (ed.): «Ad Hoc Networking», Boston: Addison-Wesley, 2001.
PERKINS, C.E.: «Mobile IP Design Principles and Practices», Upper Saddle River, NJ: Prentice Hall, 1998.
PERKINS, C.E., and ROYER, E. (Перкинс и Ройер): «The Ad Hoc On-Demand Distance-Vector Protocol», in Ad Hoc Networking, edited by C. Perkins, Boston: Addison-Wesley, 2001.
PERLMAN, R. (Перлман): «Interconnections», 2nd ed., Boston: Addison-Wesley, 2000.
PERLMAN, R.: «Network Layer Protocols with Byzantine Robustness», Ph.D. thesis, M.I.T., 1988.
PERLMAN, R.: «An Algorithm for the Distributed Computation of a Spanning Tree in an Extended LAN», Proc. SIGCOMM ’85 Conf., ACM, pp. 44–53, 1985.
PERLMAN, R., and KAUFMAN, C. (Перлман и Кауфман): «Key Exchange in IPsec», IEEE Internet Computing, vol. 4, pp. 50–56, Nov.-Dec. 2000.
PERROS, H.G. (Перрос): «Connection-Oriented Networks: SONET/SDH, ATM, MPLS and Optical Networks», New York: John Wiley & Sons, 2005.
PETERSON, L., ANDERSON, T., KATTI, S., MCKEOWN, N. PARULKAR, G., REXFORD, J., SATYANARAYANAN, M., SUNAY, O. and VAHDAT, A. (Петерсон и др.): «Democratizing the Network Edge», Computer Commun. Review, vol. 49, pp. 31–36, Apr. 2019.
PETERSON, W.W., and BROWN, D.T. (Петерсон и Браун): «Cyclic Codes for Error Detection», Proc. IRE, vol. 49, pp. 228–235, Jan. 1961.
PIATEK, M., ISDAL, T., ANDERSON, T., KRISHNAMURTHY, A., and VENKATARAMANI, V. (Пиатек и др.): «Do Incentives Build Robustness in BitTorrent?», Proc. NSDI 2007 Conf., USENIX, pp. 1–14, 2007.
PIATEK, M., KOHNO, T., and KRISHNAMURTHY, A. (Пиатек и др.): «Challenges and Directions for Monitoring P2P File Sharing Networks — or Why My Printer Received a DMCA Takedown Notice», Third Workshop on Hot Topics in Security, USENIX, July 2008.
POSTEL, J. (Постел): «Internet Control Message Protocols», RFC 792, Sept. 1981.
PYLES, J., CARRELL, J.L., and TITTEL, E. (Пайлс и др.): «Guide to TCP/IP: IPv6 and IPv4», 5th ed., Boston: Cengage Learning, 2017.
QUINLAN, J., and SREENAN, C. (Куинлан и Сринан): «Multi-profile Ultra High Definition (UHD) AVC and HEVC 4K DASH Datasets», Proc. Ninth Multimedia Systems Conf., ACM, pp. 375–380, June 2018.
RABIN, J., and MCCATHIENEVILE, C. (Рабин и МакКэтиНевил): «Mobile Web Best Practices 1.0», W3C Recommendation, July 2008.
RAMACHANDRAN, A., DAS SARMA, A., FEAMSTER, N. (Рамачандран и др.): «Bit Store: An Incentive-Compatabile Solution for Blocked Downloads in BitTorrent», Proc. Joint Workshop on Econ. Networked Syst. and Incentive-Based Computing, 2007.
RAMACHANDRAN, S., GRYYA, T., DAPENA, K., and THOMAS, P. (Рамачандран и др.): «The Truth about Faster Internet: It’s Not Worth It», The Wall Street Journal, p. A1, 2019.
RAMAKRISHNAN, K.K., FLOYD, S., and BLACK, D. (Рамакришнан и др.): «The Addition of Explicit Congestion Notification (ECN) to IP», RFC 3168, Sept. 2001.
RAMAKRISHNAN, K.K., and JAIN, R. (Рамакришнан и Джейн): «A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with a Connectionless Network Layer», Proc. SIG-COMM ’88 Conf., ACM, pp. 303–313, 1988.
RIBEZZO, G., SAMELA, G., PALMISANO, V., DE CICCO, L., and MASCOLO, S. (Рибеццо и др.): «A DASH Video Streaming for Immersive Contents», Proc. Ninth Multimedia Systems Conf., ACM, pp. 525–528, June 2018.
RIVEST, R.L. (Ривест): «The MD5 Message-Digest Algorithm», RFC 1320, Apr. 1992.
RIVEST, R.L., SHAMIR, A., and ADLEMAN, L. (Ривест и др.): «On a Method for Obtaining Digital Signatures and Public Key Cryptosystems», Commun. of the ACM, vol. 21, pp. 120–126, Feb. 1978.
ROBERTS, L.G. (Робертс): «Extensions of Packet Communication Technology to a Hand Held Personal Terminal», Proc. Spring Joint Computer Conf., AFIPS, pp. 295–298, 1972.
ROBERTS, L.G.: «Multiple Computer Networks and Intercomputer Communication», Proc. First Symp. on Operating Systems Prin., ACM, pp. 3.1–3.6, 1967.
ROSE, M.T. (Роуз): «The Simple Book», Upper Saddle River, NJ: Prentice Hall, 1994.
ROSE, M.T.: «The Internet Message», Upper Saddle River, NJ: Prentice Hall, 1993.
RUIZ-SANCHEZ, M.A., BIERSACK, E.W., and DABBOUS, W. (Руис-Санчес и др.): «Survey and Taxonomy of IP Address Lookup Algorithms», IEEE Network Magazine, vol. 15, pp. 8–23, Mar.-Apr. 2001.
SALTZER, J.H., REED, D.P., and CLARK, D.D. (Зальцер и др.): «End-to-End Arguments in System Design», ACM Trans. on Computer Systems, vol. 2, pp. 277–288, Nov. 1984.
SANTOS, F.R., DA COSTA CORDEIRO, W.L., GASPARY, L.P., and BARCELLOS, M.P. (Сантос и др.): «Funnel: Choking Polluters in BitTorrent File Sharing Communities», IEEE Trans. on Network and Service Management, vol. 8, pp. 310–321, April 2011.
SAROIU, S., GUMMADI, K., and GRIBBLE, S. (Сарою и др.): «Measuring and Analyzing the Characteristics of Napster & Gnutella Hosts», Multim. Syst., vol. 9, pp. 170–184, Aug. 2003.
SCHMITT, P., EDMUNDSON, A., MANKIN, A. and FEAMSTER, N. (Шмитт и др.): «Oblivious DNS: Practical Privacy for DNS Queries», Proc. on Privacy Enhancing Technologies, pp. 228–244, 2019.
SCHNEIER, B. (Шнайер): «Secrets and Lies», New York: John Wiley & Sons, 2004.
SCHNORR, C.P. (Шнорр): «Efficient Signature Generation for Smart Cards», Journal of Cryptology, vol. 4, pp. 161–174, 1991.
SCHWARTZ, M., and ABRAMSON, N. (Шварц и Абрамсон): «The AlohaNet: Surfing for Wireless Data», IEEE Commun. Magazine, vol. 47, pp. 21–25, Dec. 2009.
SENN, J.A. (Сенн): «The Emergence of M-Commerce», IEEE Computer, vol. 33, pp. 148–150, Dec. 2000.
SEVERANCE, C.R. (Северанс): «Introduction to Networking: How the Internet Works», Amazon Cre ateSpace, 2015.
SHAIKH, A., REXFORD, J., and SHIN, K. (Шейх и др.): «Load-Sensitive Routing of Long-Lived IP Flows», Proc. SIGCOMM ’99 Conf., ACM, pp. 215–226, Sept. 1999.
SHALUNOV, S., and CARLSON, R. (Шалунов и Карлсон): «Detecting Duplex Mismatch on Ethernet», Passive and Active Network Measurement, Springer-Verlag LNCS 3431, pp. 3135–3148, 2005.
SHANNON, C. (Шеннон): «A Mathematical Theory of Communication», Bell System Tech. J., vol. 27, pp. 379–423, July 1948; and pp. 623–656, Oct. 1948.
SHREEDHAR, M., and VARGHESE, G. (Шридхар и Варгезе): «Efficient Fair Queueing Using Deficit Round Robin», Proc. SIGCOMM ’95 Conf., ACM, pp. 231–243, 1995.
SIGANOS, G., FALOUTSOS, M., FALOUTSOS, P., and FALOUTSOS, C. (Сиганос и др.): «Power Laws and the AS-level Internet Topology», IEEE/ACM Trans. on Networking, vol. 11, pp. 514–524, Aug. 2003.
SIMPSON, W. (Симпсон): «Video Over IP», 2nd ed., Burlington, MA: Focal Press, 2008.
SIMPSON, W.: «The Point-to-Point Protocol (PPP)», RFC 1661, July 1994a.
SIMPSON, W.: «PPP in HDLC-like Framing», RFC 1662, July 1994b.
SIU, K., and JAIN, R. (Сиу и Джейн): «A Brief Overview of ATM: Protocol Layers, LAN Emulation, and Traffic», Computer Commun. Review, vol. 25, pp. 6–20, Apr. 1995.
SKOUDIS, E., and LISTON, T. (Скудис и Листон): «Counter Hack Reloaded», 2nd ed., Upper Saddle River, NJ: Prentice Hall, 2006.
SMITH, D.K., and ALEXANDER, R.C. (Смит и Александер): «Fumbling the Future», New York: William Morrow, 1988.
SOOD, K. (Суд): «Kerberos Authentication Protocol: Cryptography and Network Security», Riga, Latvia: Lap Lambert Academic Publishing, 2012.
SOTIROV, A., STEVENS, M., APPELBAUM, J., LENSTRA, A., MOLNAR, D., OSVIK, D., and DE WEGER, B. (Сотиров и др.): «MD5 Considered Harmful Today», Proc. 25th Chaos Commun. Congress, Verlag Art d’Ameublement, 2008.