A technique for counting natted hosts
暂无分享,去创建一个
[1] Tony Hain,et al. Architectural Implications of NAT , 2000, RFC.
[2] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[3] Matt Holdrege,et al. Protocol Complications with the IP Network Address Translator , 2001, RFC.
[4] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[5] Stephen E. Deering,et al. Path MTU discovery , 1990, RFC.
[6] Jacques Stern,et al. Secret linear congruential generators are not cryptographically secure , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[7] Pyda Srisuresh,et al. Traditional IP Network Address Translator (Traditional NAT) , 2001, RFC.
[8] Daniel Senie,et al. Network Address Translator (NAT)-Friendly Application Design Guidelines , 2002, RFC.
[9] David Hucaby,et al. Cisco Field Manual: Router Configuration , 2001 .
[10] Craig Smith,et al. Know Your Enemy : Passive Fingerprinting , 2001 .
[11] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[12] Ratul Mahajan,et al. Measuring ISP topologies with rocketfuel , 2002, TNET.
[13] Jon Postel,et al. Internet Protocol , 1981, RFC.
[14] Ratul Mahajan,et al. Measuring ISP topologies with rocketfuel , 2002, SIGCOMM 2002.
[15] James A. Reeds,et al. "Cracking" a Random Number Generator , 1977, Cryptologia.