Applying Self-Shielding Dynamics to the Network Architecture
暂无分享,去创建一个
Xiang Yu | Justin Yackoski | Harry Bullen | Jason H. Li | Jason H. Li | J. Yackoski | H. Bullen | Xiang Yu
[1] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[2] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[3] Bill Cheswick,et al. Worm Propagation Strategies in an IPv6 Internet , 2006, login Usenix Mag..
[4] Sandeep K. S. Gupta,et al. Vulnerabilities of PKI based Smartcards , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[5] William J. Lynn,et al. Defending a New Domain: The Pentagon's Cyberstrategy , 2010 .
[6] Peng Xie,et al. A Self-shielding Dynamic Network Architecture , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[7] Thomas Narten,et al. IPv6 Address Assignment to End Sites , 2011, RFC.