参考文献/References:
[ 1] Ste fan Savag e, Dav idW ethera l,l Anna Karlin, et al. Ne-t w ork support for IP traceback [ J]. IEEE /ACM T ransactions on N etw orking, 2001, 9( 3): 226 -237.
[ 2] Song X D, Perr ig A. Advanced and authenticated m arking schemes fo r IP traceback[ A]. In Proceeding of IEEE INFOCOM [ C]. 2001. 878- 886.
[ 3] Drew Dean, M att Frank lin and Adam Stubblefie ld. An a-l gebraic approach to iP traceback[ A]. In Proceed ings o f NDSS 0’1, 2001. 318 -326.
[ 4] K ihong Park, H ee jo Lee. On the e ffectiveness o f probab-i listic packet ma rking fo r IP tracback under de ia l o f serv ice attack [ A ]. In Proceed ing of IEEE INFOCOM [ C ]. 2001. 338 -347.
[ 5] 冯贵良, 吴新文. 代数几何码[M ]. 北京: 科学出版社, 2000. 72 -103.
[ 6] 陈国良. 并行算法的设计与分析[M ]. 北京: 高等教育出版社, 2002. 133- 149.
相似文献/References:
[1]徐 鹤,王汝传,韩志杰.一种基于分组的P2P网络安全路由算法[J].南京师范大学学报(工程技术版),2008,08(04):017.
Xu He,Wang Ruchuan,Han Zhijie,et al.A Novel Peer to Peer Network Security Route Algorithm Based on Group[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(01):017.