Trustworthy Mobile Network Architecture Based on Locator/Identity Split
Trustworthy Mobile Network Architecture Based on Locator/Identity Split
关键词
网络结构
互联网
分析方法
TCP/IP协议
location/identity split
trustworthy mobile network
LISNA
network architecture model
-
1Donghai Shi Chaofing Tang.The Study on the Fast Handoff in Mobile Network[J].通讯和计算机(中英文版),2006,3(8):29-34. 被引量:1
-
2LIU Yang,MIAO Huaikou,MA Yan.An Approach to Constructing User-constrained Trustworthy Service Flow[J].Chinese Journal of Electronics,2011,20(3):425-431. 被引量:1
-
3吴慧,于炯,于斐然.云计算环境下基于信任模型的动态级访问控制[J].计算机工程与应用,2012,48(23):102-106. 被引量:13
-
4Xiaofeng TAO,Yan HAN,Xiaodong XU,Ping ZHANG,Victor C.M.LEUNG.Recent advances and future challenges for mobile network virtualization[J].Science China(Information Sciences),2017,60(4):1-12. 被引量:2
-
5可信计算问答ABC[J].信息网络安全,2008(9):76-76.
-
6谭继红.高信度信息系统初探[J].计算机工程与应用,2005,41(19):140-142. 被引量:1
-
7蒋鲁宁.开源软件与安全可控[J].中国信息安全,2014(7):116-116. 被引量:2
-
8Wang Haoyun,Zhang Shunyi,Li Jun,Chen Zhixian.INCENTIVE MECHANISMS FOR TRUSTWORTHY ROUTING BASED ON GAME MODEL OF THE STRATEGIES OF NODES IN P2P NETWORKS[J].Journal of Electronics(China),2009,26(6):842-852.
-
9ZHANG Qiong,LEI Ming.Applying RBF network to predict location in mobile network[J].通讯和计算机(中英文版),2008,5(2):28-32.
-
10ZTE Corporation.ZTE and Innofidei Achieve Industry's First Field IOT on Multiple TD-LTE USB Dongles in a Mobile Network Cell[J].ZTE Communications,2010,8(2):54-54.