相似文献/References:
[1]程思 程家兴[].VPN中的隧道技术研究[J].计算机技术与发展,2010,(02):156.
CHENG Si,CHENG Jia-xing[].A Brief Discussion on Tunnel Technical of VPN[J].,2010,(08):156.
[2]崔宾 孟文.基于Zigbee技术的群体机器人网络研究[J].计算机技术与发展,2010,(06):141.
CUI Bin,MENG Wen.Research of Groups of Robots Network Based on Zigbee Technology[J].,2010,(08):141.
[3]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(08):170.
[4]张俊妍 陈启买.SOAP协议性能与安全的研究进展[J].计算机技术与发展,2009,(06):163.
ZHANG Jun-yan,CHEN Qi-mai.Survey on Performance and Safety of SOAP[J].,2009,(08):163.
[5]支萌萌 王汝传.一种新的P2P安全积分机制[J].计算机技术与发展,2009,(08):137.
ZHI Meng-meng,WANG Ru-chuan.A New Secure Incentive Mechanism in Peer- to- Peer System[J].,2009,(08):137.
[6]孙丽艳.基于激励机制的认知无线电自私行为研究[J].计算机技术与发展,2009,(10):170.
SUN Li-yan.Study of Cognitive Radio' Selfish Behavior Based on Two- Stage Incentives Mechanism[J].,2009,(08):170.
[7]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(08):181.
[8]赵昌伦 武波.基于.Net的军队计算机网络信息安全对策[J].计算机技术与发展,2009,(01):150.
ZHAO Chang-lun,WU Bo.Information Security Countermeasures of Army Computer Networks Based on . Net[J].,2009,(08):150.
[9]吕武玲 黎忠文.SIP中基于身份认证的安全机制研究[J].计算机技术与发展,2009,(02):158.
LU Wu-ling,LI Zhong-wen.Research on Identity- Based Authentication in SIP[J].,2009,(08):158.
[10]蔡诗维 钟诚.基于兴趣社群的P2P网络节点自治管理方法[J].计算机技术与发展,2008,(03):161.
CAI Shi-wei,ZHONG Cheng.A Self- Governing Management Approach in P2P Network Based on Interest Community[J].,2008,(08):161.