Transport Layer Issues
|
Transport Layer Issues, Optimizations, and Solutions, Spencer Dawkins |
00 |
2023-02-08 |
|
|
Optimizing TCP for Radio
|
Optimizing TCP for Radio, Marcus Ihlar |
00 |
2023-02-08 |
|
|
Enabling Traffic Management without DPI
|
Enabling Traffic Management without DPI, Mirja Kuhlewind, Dirk Kutscher, Brian Trammell |
00 |
2023-02-08 |
|
|
Mobile Use Cases for Encrypted Traffic
|
Mobile Use Cases for Encrypted Traffic, Chunshan Xiong |
00 |
2023-02-08 |
|
|
Security, Privacy, and Performance Considerations for the Mobile Web
|
Security, Privacy, and Performance Considerations for the Mobile Web, Wendy Seltzer |
00 |
2023-02-08 |
|
|
Concept for Cooperative Traffic Management
|
Concept for Cooperative Traffic Management, Szilveszter Nadas, Attila Mihaly |
00 |
2023-02-08 |
|
|
Security, Privacy, and the Effects of Ubiquitous Encryption
|
Security, Privacy, and the Effects of Ubiquitous Encryption, Kathleen Moriarty |
00 |
2023-02-08 |
|
|
GSMA Process Background
|
GSMA Process Background, Natasha Rooney |
00 |
2023-02-08 |
|
|
Scene Setting
|
Scene Setting, Stephen Farrell |
00 |
2023-02-08 |
|
|
MarNEW Main Slide Deck
|
MarNEW Main Slide Deck, Natasha Rooney |
00 |
2023-02-08 |
|
|
Encryption and government regulation: what happens now?
|
Kevin Smith, Encryption and government regulation: what happens now? |
00 |
2023-02-08 |
|
|
Tracking Mobile Video QoE in the Encrypted Internet
|
Zubair Shafiq, Tracking Mobile Video QoE in the Encrypted Internet |
00 |
2023-02-08 |
|
|
Providing Optimization of Encrypted HTTP Traffic
|
Claude Rocray, Mark Santelli and Yves Hupe, Providing Optimization of Encrypted HTTP Traffic |
00 |
2023-02-08 |
|
|
CDNs, Network Services and Encrypted Traffic
|
Mangesh Kasbekar and Vinay Kanitkar, CDNs, Network Services and Encrypted Traffic |
00 |
2023-02-08 |
|
|
Use Case Analysis and Potential Bandwidth Optimization Methods for Encrypted Traffic
|
Jianjie You, Hanyu Wei and Huaru Yang, Use Case Analysis and Potential Bandwidth Optimization Methods for Encrypted Traffic |
00 |
2023-02-08 |
|
|
Performance, Security, and Privacy Considerations for the Mobile Web
|
Wendy Seltzer, Performance, Security, and Privacy Considerations for the Mobile Web |
00 |
2023-02-08 |
|
|
Barriers to Deployment: Probing the Potential Differences in Developed and Developing Infrastructure
|
Karen O’Donoghue and Phil Roberts, Barriers to Deployment: Probing the Potential Differences in Developed and Developing Infrastructure |
00 |
2023-02-08 |
|
|
Bandwidth Control and Regulation in Mobile Networks via SDN/NFV-Based Platforms
|
Thomas Anderson, Peter Bosch and Alessandro Duminuco, Bandwidth Control and Regulation in Mobile Networks via SDN/NFV-Based Platforms |
00 |
2023-02-08 |
|
|
The effect of encrypted traffic on the QoS mechanisms in cellular networks
|
Chunshan Xiong and Milan Patel, The effect of encrypted traffic on the QoS mechanisms in cellular networks |
00 |
2023-02-08 |
|
|
Maintaining Efficiency and Privacy in Mobile Networks through Information-Centric Networking
|
Dirk Kutscher, Giovanna Carofiglio, Luca Muscariello and Paul Polakos, Maintaining Efficiency and Privacy in Mobile Networks through Information-Centric Networking |
00 |
2023-02-08 |
|
|
Network Operation in an All-Encrypted World
|
John Mattsson, Network Operation in an All-Encrypted World |
00 |
2023-02-08 |
|
|
The needed existence of Performance Enhancing Proxies in an Encrypted World
|
Marcus Ihlar, Robert Skog and Salvatore Loreto, The needed existence of Performance Enhancing Proxies in an Encrypted World |
00 |
2023-02-08 |
|
|
Sharing network state with application endpoints
|
Andreas Terzis and Chris Bentzel, Sharing network state with application endpoints |
00 |
2023-02-08 |
|
|
Enabling Traffic Management without DPI
|
Mirja Kuehlewind, Dirk Kutscher and Brian Trammell, Enabling Traffic Management without DPI |
00 |
2023-02-08 |
|
|
Vimpelcom Position Paper for MaRNEW Meeting
|
Gianpaolo Scassellati, Vimpelcom Position Paper for MaRNEW Meeting |
00 |
2023-02-08 |
|
|
Traffic Management for Encrypted Traffic focusing on Cellular Networks
|
Szilveszter Nadas and Attila Mihaly, Traffic Management for Encrypted Traffic focusing on Cellular Networks |
00 |
2023-02-08 |
|
|
Characteristics of Traffic Type Changes and Their Architectural Implications
|
Jari Arkko and Göran Eriksson, Characteristics of Traffic Type Changes and Their Architectural Implications |
00 |
2023-02-08 |
|
|
A Framework for Consent and Permissions in Mediating TLS
|
Iuniana Oprescu, Jon Peterson and Natasha Rooney, A Framework for Consent and Permissions in Mediating TLS |
00 |
2023-02-08 |
|
|
User Consent and Security as a Public Good
|
Richard Barnes and Patrick McManus, User Consent and Security as a Public Good |
00 |
2023-02-08 |
|
|
Use Cases for Communicating End-Points in Mobile Network Middle-Boxes
|
Humberto La Roche, Use Cases for Communicating End-Points in Mobile Network Middle-Boxes |
00 |
2023-02-08 |
|
|
The bandwidth balancing act: Managing QoE as encrypted services change the traffic optimization game
|
Vijay Devarapalli, The bandwidth balancing act: Managing QoE as encrypted services change the traffic optimization game |
00 |
2023-02-08 |
|
|
Enabling Secure QoE Measures for Internet Applications over Radio Networks is a MUST
|
Martin Peylo, Position Paper “Enabling Secure QoE Measures for Internet Applications over Radio Networks is a MUST” |
00 |
2023-02-08 |
|
|
The security pendulum and the network
|
Julien Maisonneuve, Thomas Fossati and Vijay Gurbani, The security pendulum and the network |
00 |
2023-02-08 |
|
|
Cooperation Framework between Application layer and Lower Layers
|
Mohammed Dadas, Emile Stephan, Mathilde Cayla, Iuniana Oprescu, Cooperation Framework between Application layer and Lower Layers |
00 |
2023-02-08 |
|
|