Design and realization of PDN connectivity procedure in LTE radio protocol stack
暂无分享,去创建一个
Liu Yi | Wang Qiong | Wang Qiong | Liu Yi
[1] Grenville J. Armitage,et al. Securing BGP — A Literature Survey , 2011, IEEE Communications Surveys & Tutorials.
[2] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[3] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[4] Diego Gambetta. Can We Trust Trust , 2000 .
[5] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[6] Ning Hu,et al. Reputation-Based Collaborative Management Method for Inter-Domain Routing Security: Reputation-Based Collaborative Management Method for Inter-Domain Routing Security , 2010 .
[7] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[8] Shi Jing-lin. Design and realization of RLC AM transmission mode in 3GPP LTE radio protocol stack , 2009 .
[9] Sandra L. Murphy,et al. BGP Security Vulnerabilities Analysis , 2006, RFC.
[10] Nick Feamster,et al. Detecting BGP configuration faults with static analysis , 2005 .