[1] |
ERMAN , BENLI , HANDE ,et al. Optimality condition of place of injury rule in cross-border internet torts and implications for turkey[J]. US-China Law Review, 2014,411(10): 1315-1321.
|
[2] |
朱韵成 . YouTube 全球受阻两小时的背后[J]. 中国教育网络, 2008(4): 26-27.
|
|
ZHU Y C . The whole truth of YouTube was has been blocked two hours[J]. China Education Network, 2008(4): 26-27.
|
[3] |
SOSNOVICH A , GRUMBERG O , NAKIBLY G . Analyzing Internet routing security using model checking[M]// Logic for Programming,Artificial Intelligence,Reasoning. 2015.
|
[4] |
刘宇靖 . 互联网域间路由系统生存性研究[D]. 长沙:国防科学技术大学, 2013.
|
|
LIU Y J . Study of the Internet inter-domain routing system surviv-ability[D]. Changsha:National University of Defense Technol-ogy, 2013.
|
[5] |
SCHLAMP J , HOLZ R , JACQUEMART Q ,et al. HEAP:reliable assessment of BGP hijacking attacks[J]. IEEE Journal on Selected Areas in Communications, 2016,34(6): 1849-1861.
|
[6] |
BALLANIH , ,FRANCIS P , ZHANGX . DNSSEC 技术发展及影响分析[C]// Conference on Applications,Technologies,Architectures and Protocols for Computer Communications. 2007: 65-276.
|
[7] |
崔淑田, 刘越 . DNSSEC 技术发展及影响分析[J]. 电信科学, 2012,28(9): 100-105.
|
|
CUI S T , LIU Y . The development and influence analysis of DNSSEC[J]. Telecommunications Science, 2012,28(9): 100-105.
|
[8] |
刘晓伟, 延志伟, 耿光刚 ,等. RPKI中CA资源分配风险及防护技术[J]. 计算机系统应用, 2016,25(8): 16-22.
|
|
LIU X W , YAN Z W , GENG G G ,et al. CA resource allocation risk and protective technique in RPKI[J]. Computer Systems and Application, 2016,25(8): 16-22.
|
[9] |
LEPINSKIM , KENTS . An infrastructure to support secure Internet routing[S]. IETF RFC , 2012.
|
[10] |
LEPINSKIM , KENTS , KONGD . A profile for route origin authorizations(ROA)[S]. IETF RFC, 2012.
|
[11] |
WAEHLISCH M . Resource public key infrastructure(RPKI)router implementation[R]. 2014.
|
[12] |
RPKI local trust anchor use cases[DB/OL]. .
|
[13] |
IAMARTINO D , PELSSER C , BUSH R . Measuring BGP route origin registration and validation[M]. Passive and Active Measurement. Berlin: Springer International PublishingPress, 2015: 28-40.
|
[14] |
HUSTONG , MICHAELSONG . Validation of route origination using the resource certificate public key infrastructure(PKI)and route origin authorizations(ROAs)[S]. IETF RFC, 2012.
|