SICS: Secure and dynamic middlebox outsourcing
暂无分享,去创建一个
Xin Li | Chen Qian | Huazhe Wang | Xin Li | Chen Qian | Huazhe Wang
[1] Hongkun Yang,et al. Real-Time Verification of Network Properties Using Atomic Predicates , 2016, IEEE/ACM Trans. Netw..
[2] Rasmus Pagh,et al. Cuckoo Hashing , 2001, Encyclopedia of Algorithms.
[3] Ye Yu,et al. Practical Network-Wide Packet Behavior Identification by AP Classifier , 2017, IEEE/ACM Transactions on Networking.
[4] Vyas Sekar,et al. Making middleboxes someone else's problem: network processing as a cloud service , 2012, SIGCOMM '12.