Marcel Waldvogel

Netfuture: The future is networked

  • Blog
    • Blog
    • Blockchain critique
  • Publications
  • Open Source Software
    • TLS Interposer
    • Automatic SOGo configuration for iOS (iPhone/iPad) and MacOSX
    • vcard4-ts: vCard version 4 parsing, TypeScript-style
    • fake-super: Recover rsync attributes
    • dnstemple: DNS with Templates
  • Tutorials
    • Tutorial: Cyclic Redundancy Check (CRC) Computation
      • Background: Asynchronous Serial Communications (RS-232C)
      • Parity Bits
      • Checksums
      • Intermission: Classes of errors
      • Check Digits
      • Error Correction Codes (ECC)
      • Cyclic Redundancy Check sequences (CRC): A Big Mystery?
      • CRC Hardware Operation
      • Software CRC Computation
      • Mathematical Background
      • Polynomial view
  • About
    • Deutsch
    • English
  • bwIDM: Föderieren auch nicht-webbasierter Dienste auf Basis von SAML

    bwIDM: Föderieren auch nicht-webbasierter Dienste auf Basis von SAML

    2012-05-20
  • Efficient BitTorrent handshake obfuscation

    Efficient BitTorrent handshake obfuscation

    2012-05-08
  • A Comparative Analysis of NAT Hole Punching

    A Comparative Analysis of NAT Hole Punching

    2011-11-01
  • Prediction quality of contact history in opportunistic networks

    Prediction quality of contact history in opportunistic networks

    2011-10-10
  • Prediction Quality of Contact History in Opportunistic Networks

    2011-10-10
  • NAT Hole Punching Revisited

    NAT Hole Punching Revisited

    2011-10-07
  • Polybius: Secure Web Single-Sign-On for Legacy Applications

    Polybius: Secure Web Single-Sign-On for Legacy Applications

    2011-06-20
  • Rolling Boles, Optimal XML Structure Integrity for Updating Operations

    Rolling Boles, Optimal XML Structure Integrity for Updating Operations

    2011-03-28
  • Hecate: Managing Authorization with RESTful XML

    Hecate: Managing Authorization with RESTful XML

    2011-03-28
  • Questioning flooding as a routing benchmark in Opportunistic Networks

    Questioning flooding as a routing benchmark in Opportunistic Networks

    2011-03-26
←Previous Page
1 … 12 13 14 15 16 … 21
Next Page→

Content on this site is licensed under CC-BY-4.0 unless otherwise noted. Some image creation has been assisted by AI, especially the weird-looking teasers.