期刊文献+
共找到410篇文章
< 1 2 21 >
每页显示 20 50 100
在阻塞冠状动脉近端和捕获栓子物质期间Proxis系统标示逆向冠状动脉血流的安全性和有效性
1
作者 Sievert H. Wahr D.W. +1 位作者 Schuler G. 郝广华 《世界核心医学期刊文摘(心脏病学分册)》 2005年第3期14-15,共2页
The Feasibility And Safety Trial for its embolic protection device during transluminal intervention in coronary vessels: a European Registry (FASTER)was designed to demonstrate that (1) the Proxis embolic protection s... The Feasibility And Safety Trial for its embolic protection device during transluminal intervention in coronary vessels: a European Registry (FASTER)was designed to demonstrate that (1) the Proxis embolic protection system can control anterograde flow and reverse blood flow in native coronary arteries and saphenous vein grafts; and (2) this system can capture embolic debris. Percutaneous coronary intervention on stenotic coronary lesions revolutionized treatment of coronary disease, but is associated with the risk of major adverse cardiac events. This prospective, nonrandomized, multicenter clinical feasibility and safety study enrolled 40 patients with 51 lesions at 4 centerswho underwent treatment of stenotic lesions with proximal emboli protection (Proxis system). Proxiswas successfully used 95%of the time, and embolic debris was qualitatively identified in all cases. Major adverse cardiac events occurred in 2 patients (5.0%): 1 late in-stent thrombosis resulting in death and 1 non-Q-wave infarction when a lesion was crossed before deployment of the Proxis system. Mean vessel occlusion time was 4.3±2.4 minutes. Native flow reversal was sufficient in 31 patients, with a mean aspirate volume of 11.8±6.5 ml. When the infusion catheter was used to augment reflow, mean occlusion time was 4.6 minutes. In conclusion, this trial is the first to demonstrate that retrograde blood flow can be achieved during proximal occlusion and that the Proxis system can be used safely during intervention of saphenous vein grafts and native coronary arterial lesions to capture embolic material. 展开更多
关键词 冠状动脉血流 proxis 近端 隐静脉移植物 安全性试验 心脏不良事件 腔内介入 血管阻塞 支架内血栓 保护装置
下载PDF
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
2
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
下载PDF
Quantum circuit-based proxy blind signatures:A novel approach and experimental evaluation on the IBM quantum cloud platform
3
作者 娄小平 昝慧茹 徐雪娇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期247-253,共7页
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a... This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution. 展开更多
关键词 proxy blind signature quantum circuits quantum computation IBM quantum cloud platform
下载PDF
基于水动力载荷混合数据集的高精度神经网络代理模型构建
4
作者 敖愈 李云波 +1 位作者 李少凡 龚家烨 《哈尔滨工程大学学报(英文版)》 CSCD 2024年第1期49-63,共15页
In this work,we constructed a neural network proxy model(NNPM)to estimate the hydrodynamic resistance in the ship hull structure design process,which is based on the hydrodynamic load data obtained from both the poten... In this work,we constructed a neural network proxy model(NNPM)to estimate the hydrodynamic resistance in the ship hull structure design process,which is based on the hydrodynamic load data obtained from both the potential flow method(PFM)and the viscous flow method(VFM).Here the PFM dataset is applied for the tuning,pre-training,and the VFM dataset is applied for the fine-training.By adopting the PFM and VFM datasets simultaneously,we aim to construct an NNPM to achieve the high-accuracy prediction on hydrodynamic load on ship hull structures exerted from the viscous flow,while ensuring a moderate data-acquiring workload.The high accuracy prediction on hydrodynamic loads and the relatively low dataset establishment cost of the NNPM developed demonstrated the effectiveness and feasibility of hybrid dataset based NNPM achieving a high precision prediction of hydrodynamic loads on ship hull structures.The successful construction of the high precision hydrodynamic prediction NNPM advances the artificial intelligence-assisted design(AIAD)technology for various marine structures. 展开更多
关键词 Deep learning neural network Hybrid dataset Proxy model Ship hull design Machine learning
下载PDF
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
5
作者 Jinqiu Hou Changgen Peng +1 位作者 Weijie Tan Hongfa Ding 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期917-938,共22页
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ... Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure. 展开更多
关键词 LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes
下载PDF
Comparative analysis of extreme ultraviolet solar radiation proxies during minimum activity levels 被引量:1
6
作者 A.G.Elias C.R.Martinis +4 位作者 B.F.de Haro Barbas F.D.Medina B.S.Zossi M.Fagre T.Duran 《Earth and Planetary Physics》 CAS CSCD 2023年第5期540-547,共8页
Four extreme ultraviolet(EUV)solar radiation proxies(Magnesium II core-to-wing ratio(MgII),Lymanαflux(Fα),10.7-cm solar radio flux(F10.7),and sunspot number(Rz))were analyzed during the last four consecutive solar a... Four extreme ultraviolet(EUV)solar radiation proxies(Magnesium II core-to-wing ratio(MgII),Lymanαflux(Fα),10.7-cm solar radio flux(F10.7),and sunspot number(Rz))were analyzed during the last four consecutive solar activity minima to investigate how they differ during minimum periods and how well they represent solar EUV radiation.Their variability within each minimum and between minima was compared by considering monthly means.A comparison was also made of their role in filtering the effect of solar activity from the critical frequency of the ionospheric F2 layer,foF2,which at mid to low latitudes depends mainly on EUV solar radiation.The last two solar cycles showed unusually low EUV radiation levels according to the four proxies.Regarding the connection between the EUV“true”variation and that of solar proxies,according to the foF2 filtering analysis,MgII and Fαbehaved in a more stable and suitable way,whereas Rz and F10.7 could be overestimating EUV levels during the last two minima,implying they would both underestimate the inter-minima difference of EUV when compared with the first two minima. 展开更多
关键词 solar EUV radiation solar minimum FOF2 solar activity solar EUV proxy
下载PDF
GIS-Based Analysis to Identify the Distribution and Accessibility of Urban Green Space in Dhaka Metropolitan City, Bangladesh 被引量:1
7
作者 Mohammad Wahidur Khan Md. Sazzad Hossain Mahbubul Alam 《Journal of Geographic Information System》 2023年第1期35-52,共18页
Urban Green Space (UGS) plays an important role in minimizing the negative effects of urbanization on city dwellers, which is predominantly factored into the accessibility to UGS. This study elucidated the distributio... Urban Green Space (UGS) plays an important role in minimizing the negative effects of urbanization on city dwellers, which is predominantly factored into the accessibility to UGS. This study elucidated the distribution and accessibility of UGS in Dhaka, Bangladesh considering the paucity of such important scientific studies in the given area. The methodological structure of this study employed a multispectral Landsat satellite image from 2020 for identifying the logically defined UGSs, as well as a minimum proxy distance being the parameter to estimate accessibility to the UGS through a primary survey scheme and literature review. Considering UGS as a public area, we adopted a hybrid (combination of supervised and unsupervised classification) method followed by post-classification for UGS distribution assessment. The unsupervised classification identified the overall distribution of green spaces, whereas the anomalies of generated classes were rectified during the post-classification. Following the study findings, UGS in Dhaka metropolitan city accounts for only 602 ha or 1.9% of the total geographical space, with Ramna thana ranked as the highest contributor of 111 ha. However, in terms of accessibility to the UGS by city residents, 19.9% of the buildings in Dhaka metropolitan city were computed to be within the determined proxy distance of 500 m around the UGS. Also, parallel to UGS distribution, green space in Ramna thana (111 ha) exhibited the highest accessibility rate (64%) to the UGS compared with other thanas in Dhaka metropolitan city. The baseline findings will contribute to the long-term sustainable urban planning and development of more accessible green spaces in the study area. 展开更多
关键词 URBANIZATION Urban Green Space ACCESSIBILITY Proxy Distance
下载PDF
A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things
8
作者 Caifen Wang Bin Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1857-1878,共22页
The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizati... The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing.One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results.Linearly homomorphic proxy signature(LHPS)is a desirable solution to ensure the reliability of outsourcing computing in the case of authorized signing right.Blockchain has the characteristics of tamper-proof and traceability,and is a new technology to solve data security.However,as far as we know,constructions of LHPS have been few and far between.In addition,the existing LHPS scheme does not focus on homomorphic unforgeability and does not use blockchain technology.Herein,we improve the security model of the LHPS scheme,and the usual existential forgery and homomorphic existential forgery of two types of adversaries are considered.Under the new model,we present a blockchain-based LHPS scheme.The security analysis shows that under the adaptive chosen message attack,the unforgeability of the proposed scheme can be reduced to the CDH hard assumption,while achieving the usual and homomorphic existential unforgeability.Moreover,comparedwith the previous LHPS scheme,the performance analysis shows that our scheme has the same key size and comparable computational overhead,but has higher security. 展开更多
关键词 Homomorphic signature proxy signature security model provable security UNFORGEABILITY
下载PDF
Sedimentary record of a late Holocene storm event in Laizhou Bay,Bohai Sea,China
9
作者 Zhenqiao LIU Liang ZHOU +2 位作者 Shu GAO Longjiang MAO Peng LU 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2023年第3期909-920,共12页
The Bohai Sea is influenced by numerous extreme oceanic wave events in history.However,it is often difficult to determine the types of these events due to the lack of detailed historical records,causing uncertainty in... The Bohai Sea is influenced by numerous extreme oceanic wave events in history.However,it is often difficult to determine the types of these events due to the lack of detailed historical records,causing uncertainty in the reconstruction of historical coastal disasters.We investigated an anomalous sand layer in the Xiliyu Village by the coast of Laizhou Bay,Shandong,from which an extreme event deposit was identified using a multi-proxy approach including grain size distribution,geochemistry,and magnetic susceptibility.This event was dated 2700–3100 a bp,and caused inundation of a large coastal area of Laizhou Bay.By comparing historical records with instrumental data,we believe that the event deposit was generated by a severe storm surge with wind speed of>34.9 m/s. 展开更多
关键词 event layer storm surge deposit multiple proxy analysis winter storms Laizhou Bay
下载PDF
The Connection Between Medical Self-determination and the System of Adult Guardianship——The Institutional Construction of Medical Proxy
10
作者 李敏 SU Yilong 《The Journal of Human Rights》 2023年第3期576-598,共23页
China has established the basic rules of informed consent in the medical field through Articles 1219 and 1220 of the tort liability part of the Civil Code of China to address the legality of medical conduct.Since pati... China has established the basic rules of informed consent in the medical field through Articles 1219 and 1220 of the tort liability part of the Civil Code of China to address the legality of medical conduct.Since patients’capacity to consent is the prerequisite,when the patient is a fully competent person,it is sufficient to give consent based on valid notification by the doctor.However,for those who are unable to give valid consent,especially adult patients with impaired capacity,resolving the legality of the doctor’s medical conduct remains an issue when it infringes on the patient’s body and health.To solve this issue,someone must give consent in place of the patient when the adult is unable to give valid consent.However,the personal and exclusive nature of the right to medical consent,which is informed consent,makes it impossible to simply delegate it to a guardian or other person to exercise it on behalf of the patient.In this paper,we borrow the concept of“medical proxy”proposed by Japanese scholar Teruaki Tayama,and for the first time,we discuss the construction of medical proxy from the perspective of adult guardianship by connecting the two systems from the standpoint of interpretive theory. 展开更多
关键词 medical proxy medical self-determination adult guardianship capacity to consent
下载PDF
植物生长延缓剂对草坪草生长发育的影响 被引量:7
11
作者 刘胜尧 李会彬 +3 位作者 杨建肖 边秀举 刘国勇 彭阿凤 《安徽农业科学》 CAS 北大核心 2007年第23期7138-7139,7141,共3页
[目的]为了研究美国研制生产的植物生长延缓剂Proxy对草坪草生长发育的影响。[方法]以冷季型草坪草高羊茅和草地早熟禾为试验材料,盆栽试验设低浓度Proxy、中浓度Proxy、高浓度Proxy和清水(CK)4个处理,研究不同浓度Proxy在我国北方气候... [目的]为了研究美国研制生产的植物生长延缓剂Proxy对草坪草生长发育的影响。[方法]以冷季型草坪草高羊茅和草地早熟禾为试验材料,盆栽试验设低浓度Proxy、中浓度Proxy、高浓度Proxy和清水(CK)4个处理,研究不同浓度Proxy在我国北方气候条件下对草坪草株高、草屑量和生长格局的影响。[结果]中、高浓度Proxy处理显著降低了草地早熟禾的株高和草屑量,而对高羊茅株高和草屑量影响不显著。中、高浓度Proxy处理使草地早熟禾的生长格局发生了明显变化,如抑制垂直生长、加速横向生长、叶片变短增厚等,草坪质量明显改善,而低浓度处理效果不明显。Proxy各浓度处理对高羊茅生长格局影响不明显。[结论]该研究为我国北方草坪草生长的合理调控提供了理论依据。 展开更多
关键词 PROXY 高羊茅 草地早熟禾 株高 草屑量
下载PDF
一种基于Proxy的Web应用安全漏洞检测方法及实现 被引量:6
12
作者 王鹃 李俊娥 刘珺 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2005年第5期135-140,共6页
指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL... 指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL代码插入、跨站点脚本算法的JAVA语言实现. 展开更多
关键词 WEB应用安全 漏洞检测 PROXY JAVA
下载PDF
基于Proxy的网络计费系统的设计与实现 被引量:15
13
作者 易正强 王耀军 《计算机工程》 CAS CSCD 北大核心 2001年第2期166-168,共3页
讨论在校园网环境下的网络计费,对基于Proxy的网络计费与管理进行了详细设计,给出了巨量数据的处理方法。
关键词 校园网 网络计费系统 代理服务器 PROXY INTERNE
下载PDF
高校校园宿舍网络建设与管理 被引量:3
14
作者 商尔从 何海涛 +1 位作者 古小红 道焰 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2001年第z1期72-76,共5页
总结1年多来中山大学校园宿舍网络的建设与管理的实践,并就一些技术和管理方法进行探讨。
关键词 宿舍网 主干网 网络拓扑结构 DHCP PROXY VLAN
下载PDF
基于Proxy服务器的计费系统 被引量:14
15
作者 鲍剑洋 王亚 《计算机应用》 CSCD 1999年第4期50-52,共3页
本文主要论述网络管理中计费系统的开发方法,探讨代理服务器的主要功能和工作流程,提出了基于Proxy服务器计费系统的系统结构和流程,最后给出了基于Proxy服务器计费系统的逻辑结构和系统功能。
关键词 网络管理 计费系统 PROXY 服务器 计算机网络
下载PDF
基于MS Proxy Server的网络计费系统的实现 被引量:2
16
作者 邹刚 敖永红 +1 位作者 柯水洲 曹承倜 《计算机工程与应用》 CSCD 北大核心 2003年第6期151-154,共4页
文中介绍了代理服务器的计费方式,阐述了基于MSProxyServer的网络计费系统的设计与实现。
关键词 MS PROXY Server 网络计费系统 计算机网络 网络管理 防火墙 代理服务器
下载PDF
基于策略DNS和HTTP Proxy的多宿主网络服务部署的研究 被引量:2
17
作者 王子荣 胡浩 +1 位作者 尹绍锋 王宇科 《计算机工程与科学》 CSCD 北大核心 2014年第2期238-243,共6页
针对目前常用的多宿主网络服务部署方法中存在的由于ISP网络地址集的变化或DNS配置等因素会造成服务访问路由不可达的不足,提出了一种基于策略DNS与HTTP Proxy在多宿主网络中服务的部署策略,在各ISP出口安装HTTP Proxy服务器,配合策略DN... 针对目前常用的多宿主网络服务部署方法中存在的由于ISP网络地址集的变化或DNS配置等因素会造成服务访问路由不可达的不足,提出了一种基于策略DNS与HTTP Proxy在多宿主网络中服务的部署策略,在各ISP出口安装HTTP Proxy服务器,配合策略DNS服务进行联合部署。从理论上对该策略进行了分析,并对部署方法进行了详细阐述。通过实例分析及效果测量,证实了在不改变网络拓扑、基本不增加投入的情况下,通过该策略可大幅度提高校园网或企业网信息资源服务的互联网用户访问速度和访问质量,并解决了传统方式中路由不可达的问题。 展开更多
关键词 策略 DNS HTTP PROXY 多宿主网络
下载PDF
EPON系统中IGMP Proxy技术实现方案 被引量:3
18
作者 朱敏 邹君妮 林如俭 《光通信技术》 CSCD 北大核心 2006年第12期19-21,共3页
提出了一种基于VLAN的EPON系统组播实现方案,满足当前宽带接入网中有效传输组播业务的需求。该方案充分利用ONU端的IGMPProxy技术,大大降低了IGMP控制报文在EPON系统、上端核心网中的流量。仿真显示了该方案在IGMP控制报文网络流量上的... 提出了一种基于VLAN的EPON系统组播实现方案,满足当前宽带接入网中有效传输组播业务的需求。该方案充分利用ONU端的IGMPProxy技术,大大降低了IGMP控制报文在EPON系统、上端核心网中的流量。仿真显示了该方案在IGMP控制报文网络流量上的性能大幅提高和优越性。 展开更多
关键词 IGMP PROXY IGMP SNOOPING 组播 VLAN 以太无源光网络
下载PDF
基于PROXY服务器的网络计费系统原理与实现 被引量:3
19
作者 谭跃生 王静宇 《内蒙古大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第2期221-223,共3页
网络计费是网络管理中重要的一部分 ,一个有效而合理的计费系统是校园网络正常运行的保证 .文章研究了代理机制 ,分析了基于 PROXY服务器的网络计费系统原理 ,提出了网络计费系统的一个开发模型 ,并对模型中的数据采集、计费信息处理、... 网络计费是网络管理中重要的一部分 ,一个有效而合理的计费系统是校园网络正常运行的保证 .文章研究了代理机制 ,分析了基于 PROXY服务器的网络计费系统原理 ,提出了网络计费系统的一个开发模型 ,并对模型中的数据采集、计费信息处理、数据查询等主要模块的设计作了较详细的阐述 . 展开更多
关键词 代理服务器 网络计费系统 日志文件 网络管理 代理机制 PROXY服务器 校园网 工作原理
下载PDF
基于NAT-PT和PROXY的HTTP过渡方案的研究与改进 被引量:2
20
作者 杨怡 陶军 《计算机工程与应用》 CSCD 北大核心 2006年第4期149-151,共3页
NAT-PT技术和PROXY技术是HTTP服务从IPv4向IPv6过渡的两种主要技术,文章讨论了基于这两种技术的过渡方案的实现与改进。论文从原理上分析现有方案,提出现有实现方案存在的问题,如NAT-PT中的动态映射地址对过期而导致的访问出错的问题,以... NAT-PT技术和PROXY技术是HTTP服务从IPv4向IPv6过渡的两种主要技术,文章讨论了基于这两种技术的过渡方案的实现与改进。论文从原理上分析现有方案,提出现有实现方案存在的问题,如NAT-PT中的动态映射地址对过期而导致的访问出错的问题,以及PROXY方案中IPv4端不能通过IPv6地址直接访问的问题。针对上述问题提出了改进方案,并通过实验证明了改进方案的可行性和有效性。 展开更多
关键词 IPV6 过渡 NAT—PT PROXY
下载PDF
上一页 1 2 21 下一页 到第
使用帮助 返回顶部