Author of the publication

A two-level source address spoofing prevention based on automatic signature and verification mechanism.

, , , and . ISCC, page 392-397. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial and temporal trends in the mortality burden of air pollution in China: 2004--2012, , , , , , , , , and 1 other author(s). Environment international, (2017)Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 681-691. Springer, (2006)Source Address Validation in Software Defined Networks., , and . SIGCOMM, page 595-596. ACM, (2016)Scalable IPv4/IPv6 Transition: A Peer-to-Peer Based Approach., , and . DBISP2P, volume 4125 of Lecture Notes in Computer Science, page 406-416. Springer, (2006)The Systematic Survey for IP Traceback Methods., and . ICUFN, page 906-911. IEEE, (2018)Analysis of Airport Departure Baggage Check-in Process Based on Passenger Behavior., , , and . ISCID (2), page 204-207. IEEE, (2017)A Trust and Reputation based Anti-SPIM Method., , and . INFOCOM, page 2485-2493. IEEE, (2008)nCDN: CDN enhanced with NDN., and . INFOCOM Workshops, page 440-445. IEEE, (2014)ASIC: an architecture for scalable intra-domain control in OpenFlow., , and . CFI, page 21-26. ACM, (2012)A quick survey on selected approaches for preparing programmable networks., , , , and . AINTEC, page 160-163. ACM, (2011)