1 |
|
IP fragment reassembly vulnerability:
|
|
ELSEVIER ADVANCED TECHNOLOGY
|
Network Security
|
2000
|
|
|
2 |
|
AES IP hardware encryptor introduced:
|
|
ELSEVIER ADVANCED TECHNOLOGY
|
Network Security
|
2000
|
|
|
3 |
|
Protocols and architecture for managing TCP/IP network infrastructures
|
A.King R.Hunt
|
Elsevier Science
|
Computer communications
|
2000
|
|
|
4 |
|
Security in IP Networks:
|
McDermott, P.;
|
ELSEVIER ADVANCED TECHNOLOGY
|
Network Security
|
2000
|
|
|
5 |
|
Weekly round-ip of NT activities and events : Webwatch; NT b
|
|
Macmillan Magazines
|
Nursing times
|
2000
|
|
|
6 |
|
Weekly round-ip of NT activities and events : Webwatch; NT b
|
|
Macmillan Magazines
|
Nursing times
|
2000
|
|
|
7 |
|
IP over WDM 기술
|
박창수
|
대한전자공학회
|
전자 공학 회지
|
2000
|
|
|
8 |
|
Network structure and TCP/IP protocol suite
|
이만영
|
한국이동통신
|
Telecommunications Review
|
2000
|
|
|
9 |
|
Towards a generic realtime transport and adaptation protocol for IP networks
|
Y.Rasheed A.Leon-Garcia
|
Elsevier Science
|
Computer communications
|
2000
|
|
|
10 |
|
Eliminating IP Address Forgery - Five Years Old and Going Strong:
|
Cohen, F.;
|
ELSEVIER ADVANCED TECHNOLOGY
|
Network Security
|
2000
|
|
|