In this article, the author demystifies the business of encrypting and decrypting network traffic, and translates arcane terms such as https, ssh, sftp, etc.
E. Adar, J. Teevan, S. Dumais, and J. Elsas. Proceedings of the Second ACM International Conference on Web Search and Data Mining - WSDM \textquotesingle09, ACM Press, (2009)
D. Liben-Nowell, and J. Kleinberg. Proceedings of the twelfth international conference on Information and knowledge management - CIKM \textquotesingle03, ACM Press, (2003)
S. Cucerzan. Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL), page 708--716. Prague, Czech Republic, Association for Computational Linguistics, (June 2007)
M. Potamias, F. Bonchi, C. Castillo, and A. Gionis. Proceeding of the 18th ACM conference on Information and knowledge management - CIKM \textquotesingle09, ACM Press, (2009)