Computer networking - a top-down approach featuring the internet
暂无分享,去创建一个
[1] Jon Postel. NCP/TCP transition plan , 1981, RFC.
[2] J. G. Fletcher,et al. An Arithmetic Checksum for Serial Transmissions , 1982, IEEE Trans. Commun..
[3] David A. Borman,et al. Computing the internet checksum , 1989, CCRV.
[4] Paul E. McKenney,et al. Packet recovery in high-speed networks using coding and buffer management , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.
[5] Krzysztof Pawlikowski,et al. Telecommunications: Protocols and Design , 1991 .
[6] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[7] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[8] Alfred C. Weaver,et al. Xtp: The Xpress Transfer Protocol , 1992 .
[9] Ernst W. Biersack. Performance evaluation of Forward Error Correction in ATM networks , 1992, SIGCOMM 1992.
[10] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[11] Anthony J. McAuley,et al. Weighted sum codes for error detection and their comparison with existing codes , 1994, TNET.
[12] D.C. Feldmeier,et al. Fast software implementation of error detection codes , 1995, TNET.
[13] Steve Kille,et al. A String Representation of Distinguished Names , 1995, RFC.
[14] P. Loshin. Electronic Commerce: On-Line Ordering and Digital Money , 1995 .
[15] Christian Huitema,et al. IPv6--the new Internet protocol , 1996 .
[16] C. Moorehead. All rights reserved , 1997 .
[17] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[18] Larry Loeb. Secure Electronic Transactions Introduction and Technical Reference , 1998 .
[19] Bettina C. Shuford,et al. Recommendations for the Future , 1998 .
[20] Don Towsley,et al. Parity-based loss recovery for reliable multicast transmission , 1998, SIGCOMM '97.
[21] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[22] Mark Merkow,et al. Building SET applications for secure transactions , 1998 .
[23] Don Towsley,et al. Real-Time Reliable Multicast Using Proactive Forward Error Correction TITLE2: , 1998 .
[24] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[25] Cheryl Madson,et al. The ESP DES-CBC Cipher Algorithm With Explicit IV , 1998, RFC.
[26] Derrell Piper,et al. The Internet IP Security Domain of Interpretation for ISAKMP , 1998, RFC.
[27] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[28] Lee Garber,et al. Steve Deering on IP Next Generation , 1999, Computer.
[29] Erik Nordmark,et al. Transition Mechanisms for IPv6 Hosts and Routers , 1996, RFC.
[30] Thomas de Quincey. [C] , 2000, The Works of Thomas De Quincey, Vol. 1: Writings, 1799–1820.
[31] P. V. Oorschot. Overview of Cryptography , .