The SwitchWare Active Network Implementation
暂无分享,去创建一个
[1] John V. Guttag,et al. ANTS: a toolkit for building and dynamically deploying network protocols , 1998, 1998 IEEE Open Architectures and Network Programming.
[2] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[3] Jonathan M. Smith,et al. Alien: a generalized computing model of active networks , 1998 .
[4] William A. Arbaugh,et al. The SwitchWare active network architecture , 1998, IEEE Netw..
[5] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[6] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[7] John H. Hartman,et al. Liquid Software: A New Paradigm for Networked Systems , 1996 .
[8] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[9] Charles L. Hedrick,et al. Routing Information Protocol , 1988, RFC.
[10] Angelos D. Keromytis,et al. Automated Recovery in a Secure Bootstrap Process , 1998, NDSS.
[11] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[12] William Allen Simpson,et al. Photuris: Session-Key Management Protocol , 1999, RFC.
[13] Radia Perlman. Interconnections: Bridges and Routers , 1992 .
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Joan Feigenbaum,et al. The KeyNote Trust-Management System , 1998 .
[16] Jon Postel,et al. Internet Protocol , 1981, RFC.
[17] Carl A. Gunter,et al. PLAN: a packet language for active networks , 1998, ICFP '98.
[18] Marianne Shaw,et al. Active bridging , 1997, SIGCOMM '97.
[19] Angelos D. Keromytis,et al. A secure active network environment architecture: realization in SwitchWare , 1998, IEEE Netw..
[20] Sushil da Silva,et al. TOWARDS PROGRAMMABLE NETWORKS , 1996 .
[21] Frann Cois Rouaix. A Web Navigator with Applets in Caml , 1996 .
[22] G.J. Minden,et al. A survey of active network research , 1997, IEEE Communications Magazine.
[23] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[24] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.