2Dong Lijun, DuMin, Yu Shengsheng. Secure Vault:an Intrusion Prevention Model for Ender-users[C]. Proc. of the 2007 International Conference on Computational Intelligence and Security. 2007:542-545.
3R. Cohen. On the establishment of an access VPN in broadband access networks[J]. Communications Magazine, IEEE, 2003, 41 (2) : 156-163.