7 7 <p></p>
8 8
9 9 <div><br>
10 10 </div>
11 11
12 12 <h1>Unspecified References</h1>
13 13 <ul>
14 +<li><a href="http://www.ana-project.org/">ANA: Autonomic Network Architecture</a> <i>(<a href="https://archive.is/sBv4z">archival
15 +copy</a>)</i><br>
16 +</li>
14 17 <li>2009_11_18 lecture titled
15 18 <a href="https://www.youtube.com/watch?v=PAtPRXZlvYE">Scaling Data Center
16 19 Networks to 100,000 Ports and Beyond</a> by Amin Vahdat</li>
17 20 <li><a href="https://github.com/coreos/etcd">etcd</a> distributed hash table</li>
21 +<li><a href="http://insecure.org/">insecure.org</a></li>
22 +<li><a href="https://iclab.org/">Internet Censorship Lab (ICLab.org)</a></li>
18 23 <li><a href="http://noiseprotocol.org/">Noise Protocol Framework</a></li>
24 +<li><a href="https://www.nsnam.org/">ns-3 Discrete-event Network Simulator</a> <i>(<a href="https://archive.is/W5TwQ">archival
25 +copy</a>)</i></li>
26 +<li><a href="http://www.openp2p.com/">openp2p.com</a></li>
19 27 <li><a href="https://www.privacytools.io">privacytools.io</a><br>
20 28 </li>
21 29 <li><a href="http://www.webfunds.org/guide/sdp/">Secure Datagram Protocol</a> <i>(<a href="https://archive.is/rCoY6">archival
22 30 copy</a>)</i></li>
23 31 <li><a href="http://www.cs.technion.ac.il/~biham/Reports/Tiger/">Tiger secure
24 32 hash</a> algorithm</li>
25 33 <li><a href="https://www.wireguard.io/">Wireguard</a></li>
26 -<li><a href="https://iclab.org/">Internet Censorship Lab (ICLab.org)</a></li>
27 -<li><a href="http://www.openp2p.com/">openp2p.com</a></li>
28 -<li><a href="http://www.ana-project.org/">ANA: Autonomic Network Architecture</a> <i>(<a href="https://archive.is/sBv4z">archival
29 -copy</a>)</i><br>
30 -</li>
31 -<li><a href="https://www.nsnam.org/">ns-3 Discrete-event Network Simulator</a> <i>(<a href="https://archive.is/W5TwQ">archival
32 -copy</a>)</i><br>
33 -</li>
34 34 </ul>
35 35
36 36 <div><br>
37 37 </div>
38 38
39 39 <h1>List of Possible Package Channels</h1>
40 40