From 7fdf443e72c398d02e6ec849951c3dadda6bb820 Mon Sep 17 00:00:00 2001 From: Jim Martens Date: Sat, 18 Oct 2014 14:38:48 +0200 Subject: [PATCH] Sem: Liste der Literatur aktualisiert --- sem/sem.bib | 73 +++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 73 insertions(+) diff --git a/sem/sem.bib b/sem/sem.bib index 0f1b828..d3f182e 100755 --- a/sem/sem.bib +++ b/sem/sem.bib @@ -26,6 +26,27 @@ Timestamp = {2013.10.29} } +@InProceedings{Duffield1999, + Title = {A Flexible Model for Resource Management in Virtual Private Network}, + Author = {Duffield, N. G. and Goyal, Pawan and Greenberg, Albert and Mishra, Partho and Ramakrishnan, K. K. and van der Merive, Jacobus E.}, + Booktitle = {Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication}, + Year = {1999}, + + Address = {New York, NY, USA}, + Pages = {95--108}, + Publisher = {ACM}, + Series = {SIGCOMM '99}, + + Acmid = {316209}, + Doi = {10.1145/316188.316209}, + ISBN = {1-58113-135-6}, + Location = {Cambridge, Massachusetts, USA}, + Numpages = {14}, + Owner = {jim}, + Timestamp = {2014.10.18}, + Url = {http://doi.acm.org/10.1145/316188.316209} +} + @Conference{Gnjatovic2012, Title = {A {Cognitively-Inspired} {Method} for {Meaning Representation} in {Dialogue Systems}}, Author = {Gnjatović, Milan and Delić, Vlado}, @@ -38,6 +59,33 @@ Timestamp = {2014.01.18} } +@Article{Gong2013, + Title = {Novel Quantum Virtual Private Network Scheme for PON via Quantum Secure Direct Communication}, + Author = {Gong, Li-Hua and Liu, Ye and Zhou, Nan-Run}, + Journal = {International Journal of Theoretical Physics}, + Year = {2013}, + Number = {9}, + Pages = {3260--3268}, + Volume = {52}, + + Abstract = {Two quantum secure direct communication (QSDC) protocols with quantum identification (QI) based on passive optical network (PON) architecture are proposed. One QSDC protocol can be implemented between two different optical network units just with simple configurations of PON by optical line terminal when they are in the same virtual private network after optical line terminal performing QI to the optical network units in the given PON architecture. The other QSDC protocol is also implemented between any two legitimated users in the virtual private network but with considerable reduction of workload of the optical line terminal. The security analysis shows that the proposed QSDC schemes with quantum identification are unconditionally secure and allow the legitimate users to exchange their secret information efficiently and to realize a quantum virtual private network in the PON networks ultimately.}, + Owner = {jim}, + Publisher = {Springer}, + Timestamp = {2014.10.18} +} + +@MastersThesis{Heinzel2003, + Title = {Virtual Private Networks}, + Author = {Heinzel, Marcus and Michaelsen, Nils and Scheibe, Alexander}, + School = {Fachbereich Informatik, Universität Hamburg}, + Year = {2003}, + Month = {Jan}, + Type = {Seminar paper}, + + Owner = {jim}, + Timestamp = {2014.10.18} +} + @InBook{Jurafsky2009, Title = {Speech and Language Processing}, Author = {Jurafsky, Daniel and Martin, James H.}, @@ -189,3 +237,28 @@ Timestamp = {2013.10.29} } +@Article{Venkateswaran2001, + Title = {Virtual Private Networks}, + Author = {Venkateswaran, R.}, + Journal = {IEEE Potentials}, + Year = {2001}, + + Month = {Feb/Mar}, + Number = {1}, + Pages = {11--15}, + Volume = {20}, + + Abstract = {A virtual private network (VPN) can help resolve many of the issues associated with today's private networks. A VPN facilitates an agile IT infrastructure. Global VPNs enable connectivity to all locations anywhere in the world at a fraction of the cost of dedicated links. VPN services enable remote access to the intranet at significantly lower cost, thus enabling support for a mobile workforce. Additionally, the VPN architecture support a reliable authentication mechanism to provide easy access to the intranet from anywhere using any available access media including analog modems, ISDN, cable modems, DSL and wireless. There are primarily three types of VPN services: (1) local area network (LAN) interconnect VPN services, (2) dial-up VPN services, and (3) Ethernet VPN services}, + Owner = {jim}, + Timestamp = {2014.10.18} +} + +@PhdThesis{Weber, + Title = {IPSec Hochverfügbarkeit}, + Author = {Weber, Ulrich}, + + Abstract = {In der Diplomarbeit geht es um die IPSec HighAvailability Integration mit Openswan und Linux-Kernel 2.6.}, + Owner = {jim}, + Timestamp = {2014.10.18} +} +