[1]
K. H. Cheung, J. Misic. On Virtual Private Networks Security Design Issues [J]. Computer Networks, 2005 38(2) 165-179.
DOI: 10.1016/s1389-1286(01)00256-0
Google Scholar
[2]
C. Y. Chun, Y. Liu, Y. F. Yan. Asymmetric tunnel model-based mobile VPN scheme [J]. Computer Engineering and Applications, 2010 46(17) 15-18. (in Chinese).
Google Scholar
[3]
Z. B. Zhou, J. Q. Tang, H. Deng. High-throughput VPN System Based on Load balancing [J]. Computer Engineering and Applications, 2012 48(36) 85-89. (in Chinese).
Google Scholar
[4]
J. Liang, R. H. Nie. Research on VPN Technology Based on IPsec [J]. Computer and Modernization, 2009 (11) 57-59. (in Chinese).
Google Scholar
[5]
H. H. Li. Recovery Scheme for Multicast Link of BGP/MPLS VPN [J]. Computer Engineering, 2012 38(17) 73-76. (in Chinese).
Google Scholar
[6]
J. Y. Chen. Applied Study on End-to-End Qos Solutions for MPLS VPN [J]. Computer Science, 2011 38(10) 389-391. (in Chinese).
Google Scholar
[7]
Internet Engineering Task Force. RFC 2401 Security Architecture for the Internet Protocol, (1998).
Google Scholar
[8]
Internet Engineering Task Force. RFC 2409 The Internet Key Exchange (IKE), (1998).
Google Scholar
[9]
Internet Engineering Task Force. RFC 3469 Framework for Multi-Protocol Label Switching (MPLS)-based Recovery, (1998).
Google Scholar
[10]
H. Y. Liang, S. M. Li, D. Li. Algorithm of dynamically managing MPLS VPN Path [J]. Application Research of Computers, 2009 26(6) 2224-2228. (in Chinese).
Google Scholar
[11]
J. X. Xu. Application of MPLS VPN Technology in Digital Libraries in Colleges and Universities [J]. Research and Exploration in Laboratory, 2012 31(4) 72-75. (in Chinese).
Google Scholar
[12]
Internet Engineering Task Force. RFC 2402 IP Authentication header, (1998).
Google Scholar
[13]
R. Cohen. On the Establishment of an Access VPN in Broadband Access Networks [J]. IEEE Communications Magazine, 2003 41(2) 156-163.
DOI: 10.1109/mcom.2003.1179565
Google Scholar
[14]
K. Gilly, C. Juiz, R. Puigjaner. An up-to-date Survey in Web Load Balancing [J]. World Wide Web, 2011 14(2) 105-131.
DOI: 10.1007/s11280-010-0101-5
Google Scholar