1 |
Stevens W R , Fenner B , Rudoff A M . UNIX Network Programming. 北京: 人民邮电出版社, 2009
|
2 |
Li Q , Jinmei T , Shima K . IPv6 Advanced Protocols Implementation. 北京: 人民邮电出版社, 2009
|
3 |
Li Q , Jinmei T , Shima K . IPv6 Advanced Protocols Implementation. 北京: 人民邮电出版社, 2009
|
4 |
Hogg S , Vyncke E . IPv6 Security. 北京: 人民邮电出版社, 2011
|
5 |
Deering S , Hinden R . Internet Protocol, Version 6. IETF RFC2460, 1998
|
6 |
Narten T , Nordmark E , Simpson W , et al. Neighbor Discovery for IP Version 6. IETF RFC4861, 2007
|
7 |
Rigney C , Willens S , Rubens A , et al. Remote Authentication Dial in User Service. IETF RFC2865, 2000
|
8 |
Arkko J , Kempf J , Zill B , et al. Secure Neighbor Discovery. IETF RFC3971, 2005
|
9 |
Davies E , Krishnan S , Savola P . IPv6 Transition/Coexistence Security Considerations. IETF RFC4942, 2007
|
10 |
Hinden R , Deering S . IP Version 6 Addressing Architecture. IETF RFC4291, 2006
|
11 |
Aura T . Cryptographically Generated Addresses. IETF RFC3972, 2005
|