Hiding traffic flow in communication networks
暂无分享,去创建一个
[1] K. S. Gilhousen,et al. ARNS: a new link layer protocol , 1988, MILCOM 88, 21st Century Military Communications - What's Possible?'. Conference record. Military Communications Conference.
[2] Robert Benjamin. Security considerations in communications systems and networks , 1990 .
[3] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[4] J. R. Zavgren. The moment-of-silence channel-access algorithm , 1989, IEEE Military Communications Conference, 'Bridging the Gap. Interoperability, Survivability, Security'.
[5] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[6] E. H. Lipper,et al. A multi-level secure message switch with minimal TCB: architectural outline and security analysis , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[7] Bruce E. Hajek,et al. Link scheduling in polynomial time , 1988, IEEE Trans. Inf. Theory.
[8] Stephen T. Kent,et al. Security Mechanisms in High-Level Network Protocols , 1983, CSUR.