共 11 条
[5]
网络安全技术概论[M]. 国防工业出版社 , 南湘浩, 2003
[7]
XIA[J] . David Naylor,Matthew K. Mukerjee,Patrick Agyapong,Robert Grandl,Ruogu Kang,Michel Machado,Stephanie Brown,Cody Doucette,Hsu-Chun Hsiao,Dongsu Han,Tiffany Hyun-Jin Kim,Hyeontaek Lim,Carol Ovon,Dong Zhou,Soo Bum Lee,Yue-Hsun Lin,Colleen Stuart,Daniel Barrett,Aditya Akella,David Andersen,John Byers,Laura Dabbish,Michael Kaminsky,Sara Kiesler,Jon Peha,Adrian Perrig,Srinivasan Seshan,Marvin Sirbu,Peter Steenkiste. ACM SIGCOMM Computer Communication Review . 2014 (3)
[8]
MobilityFirst[J] . Dipankar Raychaudhuri,Kiran Nagaraja,Arun Venkataramani. ACM SIGMOBILE Mobile Computing and Communications Review . 2012 (3)
[9]
Security and privacy issues for the network of the future[J] . Giannis F. Marias,Jo?o Barros,Markus Fiedler,Andreas Fischer,Harald Hauff,Ralph Herkenhoener,Antonio Grillo,Alessandro Lentini,Luisa Lima,Charlott Lorentzen,Wojciech Mazurczyk,Hermann Meer,Paulo F. Oliveira,George C. Polyzos,Enric Pujol,Krzysztof Szczypiorski,Jo?o P. Vilela,Tiago T. V. Vinhoza. Security Comm. Networks . 2011 (9)
[10]
A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) .Mobility .2 H.Meng,Z.Chen,Z.Meng,C.Song. The International Conference on Information and Communications Security (ICICS) . 2015