Skip to contents

  1. Rom, Raphael [Author] ; Sidi, Moshe [Other]; Rom, Refā'ēl [Other]; Sidi, Moše [Other]

    Multiple access protocols : performance and analysis

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    New York; Berlin; Heidelberg [u.a.]: Springer, 1990

    Published in: Telecommunication networks and computer systems

  2. Freer, John R. [Author]

    Computer communications and networks

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    New York [u.a.]: Plenum Pr., 1988

    Published in: Applications of communications theory

  3. Gasakis, Mele [Author]; Schmidt, Max [Author] ; Books on Demand GmbH Norderstedt

    Beyond cryptographic routing : the Echo Protocol in the new Era of Exponential Encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to Peer-to-Peer-Flooding-Networks like the Echo respective to Friend-to-Friend Trust-Networks like they are built over the POPTASTIC protocol

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Norderstedt: BoD - Books on Demand, 2018