Design and analysis of firewall-penetrated scheme based on...

Design and analysis of firewall-penetrated scheme based on trusted host

Deng-yin ZHANG, Qian-qian WANG, Jian XU
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
14
Year:
2007
Language:
english
Pages:
6
DOI:
10.1016/s1005-8885(07)60053-3
File:
PDF, 732 KB
english, 2007
Conversion to is in progress
Conversion to is failed