Skip to main content

IAB Workshop on Managing Radio Networks in an Encrypted World (marnewws)

Slides

Title Abstract Curr. rev. Date Last presented On agenda
Transport Layer Issues Transport Layer Issues, Optimizations, and Solutions, Spencer Dawkins 00 2023-02-08
Optimizing TCP for Radio Optimizing TCP for Radio, Marcus Ihlar 00 2023-02-08
Enabling Traffic Management without DPI Enabling Traffic Management without DPI, Mirja Kuhlewind, Dirk Kutscher, Brian Trammell 00 2023-02-08
Mobile Use Cases for Encrypted Traffic Mobile Use Cases for Encrypted Traffic, Chunshan Xiong 00 2023-02-08
Security, Privacy, and Performance Considerations for the Mobile Web Security, Privacy, and Performance Considerations for the Mobile Web, Wendy Seltzer 00 2023-02-08
Concept for Cooperative Traffic Management Concept for Cooperative Traffic Management, Szilveszter Nadas, Attila Mihaly 00 2023-02-08
Security, Privacy, and the Effects of Ubiquitous Encryption Security, Privacy, and the Effects of Ubiquitous Encryption, Kathleen Moriarty 00 2023-02-08
GSMA Process Background GSMA Process Background, Natasha Rooney 00 2023-02-08
Scene Setting Scene Setting, Stephen Farrell 00 2023-02-08
MarNEW Main Slide Deck MarNEW Main Slide Deck, Natasha Rooney 00 2023-02-08
Encryption and government regulation: what happens now? Kevin Smith, Encryption and government regulation: what happens now? 00 2023-02-08
Tracking Mobile Video QoE in the Encrypted Internet Zubair Shafiq, Tracking Mobile Video QoE in the Encrypted Internet 00 2023-02-08
Providing Optimization of Encrypted HTTP Traffic Claude Rocray, Mark Santelli and Yves Hupe, Providing Optimization of Encrypted HTTP Traffic 00 2023-02-08
CDNs, Network Services and Encrypted Traffic Mangesh Kasbekar and Vinay Kanitkar, CDNs, Network Services and Encrypted Traffic 00 2023-02-08
Use Case Analysis and Potential Bandwidth Optimization Methods for Encrypted Traffic Jianjie You, Hanyu Wei and Huaru Yang, Use Case Analysis and Potential Bandwidth Optimization Methods for Encrypted Traffic 00 2023-02-08
Performance, Security, and Privacy Considerations for the Mobile Web Wendy Seltzer, Performance, Security, and Privacy Considerations for the Mobile Web 00 2023-02-08
Barriers to Deployment: Probing the Potential Differences in Developed and Developing Infrastructure Karen O’Donoghue and Phil Roberts, Barriers to Deployment: Probing the Potential Differences in Developed and Developing Infrastructure 00 2023-02-08
Bandwidth Control and Regulation in Mobile Networks via SDN/NFV-Based Platforms Thomas Anderson, Peter Bosch and Alessandro Duminuco, Bandwidth Control and Regulation in Mobile Networks via SDN/NFV-Based Platforms 00 2023-02-08
The effect of encrypted traffic on the QoS mechanisms in cellular networks Chunshan Xiong and Milan Patel, The effect of encrypted traffic on the QoS mechanisms in cellular networks 00 2023-02-08
Maintaining Efficiency and Privacy in Mobile Networks through Information-Centric Networking Dirk Kutscher, Giovanna Carofiglio, Luca Muscariello and Paul Polakos, Maintaining Efficiency and Privacy in Mobile Networks through Information-Centric Networking 00 2023-02-08
Network Operation in an All-Encrypted World John Mattsson, Network Operation in an All-Encrypted World 00 2023-02-08
The needed existence of Performance Enhancing Proxies in an Encrypted World Marcus Ihlar, Robert Skog and Salvatore Loreto, The needed existence of Performance Enhancing Proxies in an Encrypted World 00 2023-02-08
Sharing network state with application endpoints Andreas Terzis and Chris Bentzel, Sharing network state with application endpoints 00 2023-02-08
Enabling Traffic Management without DPI Mirja Kuehlewind, Dirk Kutscher and Brian Trammell, Enabling Traffic Management without DPI 00 2023-02-08
Vimpelcom Position Paper for MaRNEW Meeting Gianpaolo Scassellati, Vimpelcom Position Paper for MaRNEW Meeting 00 2023-02-08
Traffic Management for Encrypted Traffic focusing on Cellular Networks Szilveszter Nadas and Attila Mihaly, Traffic Management for Encrypted Traffic focusing on Cellular Networks 00 2023-02-08
Characteristics of Traffic Type Changes and Their Architectural Implications Jari Arkko and Göran Eriksson, Characteristics of Traffic Type Changes and Their Architectural Implications 00 2023-02-08
A Framework for Consent and Permissions in Mediating TLS Iuniana Oprescu, Jon Peterson and Natasha Rooney, A Framework for Consent and Permissions in Mediating TLS 00 2023-02-08
User Consent and Security as a Public Good Richard Barnes and Patrick McManus, User Consent and Security as a Public Good 00 2023-02-08
Use Cases for Communicating End-Points in Mobile Network Middle-Boxes Humberto La Roche, Use Cases for Communicating End-Points in Mobile Network Middle-Boxes 00 2023-02-08
The bandwidth balancing act: Managing QoE as encrypted services change the traffic optimization game Vijay Devarapalli, The bandwidth balancing act: Managing QoE as encrypted services change the traffic optimization game 00 2023-02-08
Enabling Secure QoE Measures for Internet Applications over Radio Networks is a MUST Martin Peylo, Position Paper “Enabling Secure QoE Measures for Internet Applications over Radio Networks is a MUST” 00 2023-02-08
The security pendulum and the network Julien Maisonneuve, Thomas Fossati and Vijay Gurbani, The security pendulum and the network 00 2023-02-08
Cooperation Framework between Application layer and Lower Layers Mohammed Dadas, Emile Stephan, Mathilde Cayla, Iuniana Oprescu, Cooperation Framework between Application layer and Lower Layers 00 2023-02-08