updated bib
This commit is contained in:
parent
7b84aa0240
commit
358fbc9fd7
@ -137,7 +137,7 @@ Section: Proceedings on Privacy Enhancing Technologies},
|
||||
author = {Wischik, Damon and Handley, Mark and Raiciu, Costin},
|
||||
editor = {Núñez-Queija, Rudesindo and Resing, Jacques},
|
||||
year = {2009},
|
||||
keywords = {congestion control, fluid model, load balancing, multipath TCP, resource pooling},
|
||||
keywords = {multipath TCP, congestion control, fluid model, load balancing, resource pooling},
|
||||
pages = {204--218},
|
||||
file = {Springer Full Text PDF:/home/jake/Zotero/storage/3Y23DZS8/Wischik et al. - 2009 - Control of Multipath TCP and Optimization of Multi.pdf:application/pdf},
|
||||
}
|
||||
@ -150,3 +150,18 @@ Section: Proceedings on Privacy Enhancing Technologies},
|
||||
author = {Handley, Mark and Bonaventure, Olivier and Raiciu, Costin and Ford, Alan and Paasch, Christoph},
|
||||
file = {Snapshot:/home/jake/Zotero/storage/ATRML74P/rfc8684.html:text/html},
|
||||
}
|
||||
|
||||
@book{anderson_security_2008,
|
||||
address = {Indianapolis, IN},
|
||||
edition = {2nd ed},
|
||||
title = {Security engineering: a guide to building dependable distributed systems},
|
||||
isbn = {978-0-470-06852-6},
|
||||
shorttitle = {Security engineering},
|
||||
publisher = {Wiley Pub},
|
||||
author = {Anderson, Ross},
|
||||
year = {2008},
|
||||
note = {OCLC: ocn192045774},
|
||||
keywords = {Computer security, Distributed processing, Electronic data processing},
|
||||
annote = {What is security engineering? -- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance},
|
||||
file = {Anderson - 2008 - Security engineering a guide to building dependab.pdf:/home/jake/Zotero/storage/KP7KURZX/Anderson - 2008 - Security engineering a guide to building dependab.pdf:application/pdf},
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user