1
0
mirror of https://github.com/2martens/uni.git synced 2026-05-06 19:36:26 +02:00

Sem: Liste der Literatur aktualisiert

This commit is contained in:
Jim Martens
2014-10-18 14:38:48 +02:00
parent 42962c3f93
commit 7fdf443e72

View File

@ -26,6 +26,27 @@
Timestamp = {2013.10.29} Timestamp = {2013.10.29}
} }
@InProceedings{Duffield1999,
Title = {A Flexible Model for Resource Management in Virtual Private Network},
Author = {Duffield, N. G. and Goyal, Pawan and Greenberg, Albert and Mishra, Partho and Ramakrishnan, K. K. and van der Merive, Jacobus E.},
Booktitle = {Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication},
Year = {1999},
Address = {New York, NY, USA},
Pages = {95--108},
Publisher = {ACM},
Series = {SIGCOMM '99},
Acmid = {316209},
Doi = {10.1145/316188.316209},
ISBN = {1-58113-135-6},
Location = {Cambridge, Massachusetts, USA},
Numpages = {14},
Owner = {jim},
Timestamp = {2014.10.18},
Url = {http://doi.acm.org/10.1145/316188.316209}
}
@Conference{Gnjatovic2012, @Conference{Gnjatovic2012,
Title = {A {Cognitively-Inspired} {Method} for {Meaning Representation} in {Dialogue Systems}}, Title = {A {Cognitively-Inspired} {Method} for {Meaning Representation} in {Dialogue Systems}},
Author = {Gnjatović, Milan and Delić, Vlado}, Author = {Gnjatović, Milan and Delić, Vlado},
@ -38,6 +59,33 @@
Timestamp = {2014.01.18} Timestamp = {2014.01.18}
} }
@Article{Gong2013,
Title = {Novel Quantum Virtual Private Network Scheme for PON via Quantum Secure Direct Communication},
Author = {Gong, Li-Hua and Liu, Ye and Zhou, Nan-Run},
Journal = {International Journal of Theoretical Physics},
Year = {2013},
Number = {9},
Pages = {3260--3268},
Volume = {52},
Abstract = {Two quantum secure direct communication (QSDC) protocols with quantum identification (QI) based on passive optical network (PON) architecture are proposed. One QSDC protocol can be implemented between two different optical network units just with simple configurations of PON by optical line terminal when they are in the same virtual private network after optical line terminal performing QI to the optical network units in the given PON architecture. The other QSDC protocol is also implemented between any two legitimated users in the virtual private network but with considerable reduction of workload of the optical line terminal. The security analysis shows that the proposed QSDC schemes with quantum identification are unconditionally secure and allow the legitimate users to exchange their secret information efficiently and to realize a quantum virtual private network in the PON networks ultimately.},
Owner = {jim},
Publisher = {Springer},
Timestamp = {2014.10.18}
}
@MastersThesis{Heinzel2003,
Title = {Virtual Private Networks},
Author = {Heinzel, Marcus and Michaelsen, Nils and Scheibe, Alexander},
School = {Fachbereich Informatik, Universität Hamburg},
Year = {2003},
Month = {Jan},
Type = {Seminar paper},
Owner = {jim},
Timestamp = {2014.10.18}
}
@InBook{Jurafsky2009, @InBook{Jurafsky2009,
Title = {Speech and Language Processing}, Title = {Speech and Language Processing},
Author = {Jurafsky, Daniel and Martin, James H.}, Author = {Jurafsky, Daniel and Martin, James H.},
@ -189,3 +237,28 @@
Timestamp = {2013.10.29} Timestamp = {2013.10.29}
} }
@Article{Venkateswaran2001,
Title = {Virtual Private Networks},
Author = {Venkateswaran, R.},
Journal = {IEEE Potentials},
Year = {2001},
Month = {Feb/Mar},
Number = {1},
Pages = {11--15},
Volume = {20},
Abstract = {A virtual private network (VPN) can help resolve many of the issues associated with today's private networks. A VPN facilitates an agile IT infrastructure. Global VPNs enable connectivity to all locations anywhere in the world at a fraction of the cost of dedicated links. VPN services enable remote access to the intranet at significantly lower cost, thus enabling support for a mobile workforce. Additionally, the VPN architecture support a reliable authentication mechanism to provide easy access to the intranet from anywhere using any available access media including analog modems, ISDN, cable modems, DSL and wireless. There are primarily three types of VPN services: (1) local area network (LAN) interconnect VPN services, (2) dial-up VPN services, and (3) Ethernet VPN services},
Owner = {jim},
Timestamp = {2014.10.18}
}
@PhdThesis{Weber,
Title = {IPSec Hochverfügbarkeit},
Author = {Weber, Ulrich},
Abstract = {In der Diplomarbeit geht es um die IPSec HighAvailability Integration mit Openswan und Linux-Kernel 2.6.},
Owner = {jim},
Timestamp = {2014.10.18}
}