[1] |
于强, 霍红卫 . 一组提高存储效率的深度包检测算法[J]. 软件学报, 2011,22(1): 149-163.
|
|
YU Q , HUO H W . Algorithms improving the storage efficiency of deep packet inspection[J]. Journal of Software, 2011,22(1): 149-163.
|
[2] |
袁泉, 汤红波, 黄开枝 ,等. 基于Q-learning算法的vEPC虚拟网络功能部署方法[J]. 通信学报, 2017,38(8): 172-182.
|
|
YUAN Q , TANG H B , HUANG K Z ,et al. Deployment method for vEPC virtualized network function via Q-learning[J]. Journal on Communications, 2017,38(8): 172-182.
|
[3] |
XU J , FAN J , AMMAR M H ,et al. Prefix-preserving IP address anonymization:measurement-based security evaluation and a new cryptography-based scheme[C]// 10th IEEE International Conference on Network Protocols. 2002: 280-289.
|
[4] |
SHERRY J , HASAN S , SCOTT C ,et al. Making middleboxes someone else's problem:network processing as a cloud service[J]. ACM SIGCOMM Computer Communication Review, 2012,42(4): 13-24.
|
[5] |
GIBB G , ZENG H , MCKEOWN N . Outsourcing network functionality[C]// The First Workshop on Hot Topics in Software Defined Networks. 2012: 73-78.
|
[6] |
KHAKPOUR A R , LIU A X . First step toward cloud-based fire-walling[C]// 2012 IEEE 31st Sym-posium on Reliable Distributed Systems (SRDS). 2012: 41-50.
|
[7] |
KUREK T , NIEMIEC M , LASON A . Taking back control of privacy:a novel framework for preserving cloud-based firewall policy confidentiality[J]. International Journal of Information Security, 2016,15(3): 235-250.
|
[8] |
SHI J , ZHANG Y , ZHONG S . Privacy-preserving network functionality outsourcing[J]. arXiv preprint,arXiv:1502.00389, 2015.
|
[9] |
CORON J S , LEPOINT T , TIBOUCHI M . Practical multilinear maps over the integers[M]// Advances in Cryptology–CRYPTO. 2013: 476-493.
|
[10] |
CHEON J H , HAN K , LEE C ,et al. Cryptanalysis of the multilinear map over the integers[M]// Advances in Cryptology–EUROCRYPT, 2015: 3-12.
|
[11] |
MELIS L , ASGHAR H J , DE CRISTOFARO E ,et al. Private processing of outsourced network functions:feasibility and constructions[C]// The 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. 2016: 39-44.
|
[12] |
SHERRY J , LAN C , POPA R A ,et al. Blindbox:deep packet inspection over encrypted traffic[J]. ACM SIGCOMM Computer Communication Review, 2015,45(4): 213-226.
|
[13] |
LAN C , SHERRY J , POPA R A ,et al. Embark:securely outsourcing middle-boxes to the cloud[C]// 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 2016: 255-273.
|
[14] |
ASGHAR H J , MELIS L , SOLDANI C ,et al. SplitBox:toward efficient private network function virtualization[C]// The Workshop on Hot Topics in Middleboxes and Network Function Virtualization. 2016: 7-13.
|
[15] |
MATT B . Introduction to computer security[M]. Pearson Education India, 2006.
|
[16] |
WANG C , CHOW S S M , WANG Q ,et al. Privacy-preserving public auditing for secure cloud storage[J]. IEEE transactions on computers, 2013,62(2): 362-375.
|
[17] |
DAEMEN J , RIJMEN V . The design of Rijndael:AES-the advanced encryption standard[M]. Springer Science & Business Media, 2013.
|