RTP: A Transport Protocol for Real-Time Applications
暂无分享,去创建一个
Henning Schulzrinne | Ron Frederick | Van Jacobson | Stephen L. Casner | V. Jacobson | H. Schulzrinne | S. Casner | R. Frederick
[1] Robert T. Braden,et al. Requirements for Internet Hosts - Application and Support , 1989, RFC.
[2] Scott O. Bradner,et al. Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.
[3] Ian Wakeman,et al. Scalable Feedback Control for Multicast Video Distribution in the Internet , 1994, SIGCOMM.
[4] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[5] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[6] Yakov Rekhter,et al. Address Allocation for Private Internets , 1994, RFC.
[7] Paul V. Mockapetris,et al. Domain names - implementation and specification , 1987, RFC.
[8] David D. Clark,et al. Architectural considerations for a new generation of protocols , 1990, SIGCOMM '90.
[9] Jon Postel,et al. Assigned Numbers , 1979, RFC.
[10] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[11] Van Jacobson,et al. The synchronization of periodic routing messages , 1993, SIGCOMM '93.
[12] Donald E. Eastlake,et al. Randomness Recommendations for Security , 1994, RFC.
[13] David M. Balenson. Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers , 1993, RFC.
[14] James A. Cadzow,et al. Foundations of digital signal processing and data analysis , 1987 .
[15] Stephen T. Kent,et al. Security Mechanisms in High-Level Network Protocols , 1983, CSUR.
[16] Louise E. Moser,et al. Network protocols , 1998 .
[17] Paul V. Mockapetris,et al. Domain names: Concepts and facilities , 1983, RFC.
[18] Stuart G. Stubblebine,et al. Security Services for Multimedia Conferencing , 1993 .
[19] Claudio Topolcic,et al. Experimental Internet Stream Protocol: Version 2 (ST-II) , 1990, RFC.
[20] David L. Mills,et al. Network Time Protocol (Version 3) Specification, Implementation and Analysis , 1992, RFC.
[21] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1967 .
[22] John Linn,et al. Privacy enhancement for Internet electronic mail: Part III - algorithms, modes, and identifiers , 1989, RFC.
[23] B. Harshbarger. An Introduction to Probability Theory and its Applications, Volume I , 1958 .
[24] M. F.,et al. Bibliography , 1985, Experimental Gerontology.
[25] Douglas Comer,et al. Internetworking with TCP/IP , 1988 .
[26] Henning Schulzrinne,et al. Issues in Designing a Transport Protocol for Audio and Video Conferences and other Multiparticipant Real-Time Applications , 1993 .
[27] D. H. Crocker,et al. Standard for the format of arpa intemet text messages , 1982 .
[28] David L. Mills,et al. Network Time Protocol (Version 3) Specification, Implementation , 1992 .
[29] Eliot Lear,et al. Network 10 Considered Harmful (Some Practices Shouldn't be Codified) , 1994, RFC.
[30] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[31] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[32] Francois Yergeau. UTF-8, a transformation format of ISO 10646 , 1998, RFC.
[33] Henning Schulzrinne,et al. Dynamic QoS control of multimedia applications based on RTP , 1996, Comput. Commun..
[34] Henning Schulzrinne,et al. Real Time Streaming Protocol (RTSP) , 1998, RFC.