共 16 条
- [1] [Anonymous], 2009, 2009 IFIP INT C WIRE, DOI DOI 10.1109/WOCN.2009.5010548
- [2] Avallone S, 2004, INT CONF QUANT EVAL, P316
- [3] Bahaman N., 2012, 2012 International Conference on Innovation Management and Technology Research, P263, DOI 10.1109/ICIMTR.2012.6236400
- [4] Chen JL, 2004, 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, P545
- [5] Gilligan R., 1996, REQUEST COMMENTS 193
- [6] Govil J, 2008, PROCEEDINGS IEEE SOUTHEASTCON 2008, VOLS 1 AND 2, P178
- [7] Maula A., 2010, REV QUALITATIVE ANAL, P1
- [8] Narayan S., 2010, P IEEE 2 INT C SIGN, pV2
- [9] The influence of wireless 802.11g LAN encryption methods on throughput and round trip time for various Windows operating systems [J]. CNSR 2008: PROCEEDINGS OF THE 6TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2008, : 171 - 175
- [10] Network Performance Analysis of VPN Protocols: An empirical comparison on different operating systems [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 645 - 648