<blockquote id="weqoq"></blockquote>
<tr id="weqoq"><code id="weqoq"></code></tr>
  • <tr id="weqoq"><code id="weqoq"></code></tr>
  • <legend id="weqoq"></legend>
  • <center id="weqoq"><sup id="weqoq"></sup></center>
  • <legend id="weqoq"><input id="weqoq"></input></legend>
  • ·¨ÂÉͼÊé¹Ý

  • з¨¹æËÙµÝ

  • ¹ØÓÚÍøÂçÓòÃû·¨Âɱ£»¤µÄ̽ÌÖ

    [ ÕÔ»ªÑÞ ]¡ª¡ª(2005-3-26) / ÒÑÔÄ45128´Î

    2ÍõÔÆ±ó.ITÒµµÄ֪ʶ²úȨ[M].±±¾©£º¾­¼Ã¹ÜÀí³ö°æÉç,2001.4.303Ò³
    3ÕÅÆ½.ÍøÂç֪ʶ²úȨ¼°ÆäÏà¹Ø·¨ÂÉÎÊÌâ͸Îö[M].¹ãÖÝ£º¹ãÖݳö°æÉç,2000.10.
    4³ÂÃÀÕÂ.Áõ½­±ò.Êý×Ö»¯¼¼ÊõµÄ֪ʶ²úȨ±£»¤[M].±±¾©£ºÖªÊ¶²úȨ³ö°æÉç,2000.5
    5Ѧºç£®ÍøÂçʱ´úµÄ֪ʶ²úȨ·¨[M]£®±±¾©£º·¨Âɳö°æÉç,2000.6.
    6ÊÙ²½¡¢ÕŻۡ¢À.ÐÅϢʱ´ú֪ʶ²úȨ½Ì³Ì[M].±±¾©£º¸ßµÈ½ÌÓý³ö°æÉç,2003.8.
    7ÁõÖ¾ÓÂ.ÍøÂçÓòÃûµÄ֪ʶ²úȨ±£»¤[J].Ç鱨ÔÓÖ¾.2003£¨6£©.7Ò³
    8ÄÇÁ¦.Öܺì.ÓòÃûµÄ·¨Âɱ£»¤[J].ÄϾ©¾­¼ÃѧԺѧ±¨.2002£¨1£©.66Ò³
    9л¹Ú±ó.´ÓÓòÃûµÄ·¨Âɱ£»¤¿´ÖªÊ¶²úÈ¨ÖÆ¶ÈµÄ·¢Õ¹[J].·¨Ñ§ÆÀÂÛ.2001£¨3£©.61Ò³
    10Íõº£Ó¢.ÓòÃû·¨Âɱ£»¤Ì½Îö[J].Öй²¸£½¨Ê¡Î¯µ³Ð£Ñ§±¨.2000£¨4£©.39Ò³
    11ÕŶ«Ã·.ÂÛ»¥ÁªÍøÓòÃûµÄ·¨Âɱ£»¤[J].¸£½¨Ê¦·¶´óѧѧ±¨£¨ÕÜѧÉç»á¿ÆÑ§°æ£©.2000£¨3£©.39Ò³
    12³Â¾´È«.ÂÛÓòÃûµÄ֪ʶ²úȨ±£»¤[J].Ç鱨¿ÆÑ§.2000£¨12£©.
    13ÀîÏþ°².ÂÛÍøÂçÓòÃûµÄ֪ʶ²úȨ±£»¤[J].ƽԭ´óѧѧ±¨.2000.2
    14Íõ»Ô.µç×ÓÉÌÎñÖеÄÓòÃûÓë֪ʶ²úȨµÄ¹ØÏµ¼°·¨Âɱ£»¤[J].¸ÊËàÐÐÕþѧԺѧ±¨.2003£¨4£©.82Ò³
    15°ØÀö.ÓòÃûºÍÉ̱êµÄ³åÍ»¼°ÎÒ¹úÓòÃûÖÆ¶ÈµÄÍêÉÆ[J].µ±´ú·¨Ñ§.2003£¨3£©.81Ò³
    16³Â½­.ÁÖÐý.ÎÒ¹úÏÖÐз¨ÂɶÔÓòÃû¾À·×µÄ½â¾öºÍÍêÉÆ[J].ÂÉʦÊÀ½ç.2000£¨7£©.21Ò³
    17ÖÜÇ廪.ÕÅÕ×·ã.¶ÔÓòÃûÎÊÌâµÄ·¨ÂÉ˼¿¼[J].µ±´ú·¨Ñ§.2003£¨12£©.151Ò³
    18·ëÄÈ.ÓòÃû×¢²á¾À·×µÄ·¨ÂÉÎÊÌâ[J].µ±´ú·¨Ñ§.2003£¨5£©.120Ò³
    19Íõºìƽ.ÖÐÎÄÓòÃû¹ÜÀíȨÕù¶áÕ½À­¿ªá¡Ä»[J].ÁËÍû.2001.4£¨14£©.
    20Íõ°ëÄÁ.ÇÀ×¢ÓòÃûÐÐΪ¼°Æä·¨ÂÉÊÊÓÃ[J].·¨ÂÉÊÊÓÃ.2001£¨9£©.
    21ФÀèÃ÷.ÂÛÓòÃûµÄ֪ʶ²úȨ±£»¤[J].ÂÉʦÊÀ½ç.1999£¨4£©.
    22ºéÓѽ­.ÎöÖйúÓòÃûÕùÒé´¦Àí³ÌÐò[J].ÂÉʦÊÀ½ç.2001£¨12£©
    23Klotz, Robert J. The politics of Internet communication .2004
    24Cheung,Steven.An intrusion tolerance approach for protecting network infrastructures .2000
    25Edwards, Lilian ed. Law and the Internet : a framework for electronic commerce .2000
    26Hagemann,Nicole.Rechtsschutz gegen Kennzeichenmissbrauch unter Ber¨¹cksichtigung der Internet-Domain-Name-Problemati.2001
    27Wang,Xunhua. Improving information system security through removing single point of attack.2002
    28Chen,Yu.IDNS [microform] : an efficient approach to portability and
    mobility support.2003




    ×ܹ²4Ò³¡¡¡¡[1] [2] [3] 4

    ÉÏÒ»Ò³¡¡¡¡

    ==========================================

    ÃâÔðÉùÃ÷£º
    ÉùÃ÷£º±¾ÂÛÎÄÓÉ¡¶·¨ÂÉͼÊé¹Ý¡·ÍøÕ¾Êղأ¬
    ½ö¹©Ñ§ÊõÑо¿²Î¿¼Ê¹Óã¬
    °æÈ¨ÎªÔ­×÷ÕßËùÓУ¬Î´¾­×÷ÕßͬÒ⣬²»µÃ×ªÔØ¡£

    ==========================================

    ÂÛÎÄ·ÖÀà

    A ·¨Ñ§ÀíÂÛ

    C ¹ú¼Ò·¨¡¢ÏÜ·¨

    E ÐÐÕþ·¨

    F ÐÌ·¨

    H Ãñ·¨

    I ÉÌ·¨

    J ¾­¼Ã·¨

    N ËßËÏ·¨

    S ˾·¨ÖƶÈ

    T ¹ú¼Ê·¨


    Copyright © 1999-2021 ·¨ÂÉͼÊé¹Ý

    .

    .

    Å·ÃÀ¾«Æ·Ò»Çø¶þÇøÃÛÍÎÑÇÖÞ <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Ö©Öë´Ê>| <Îı¾Á´> <Îı¾Á´> <Îı¾Á´> <Îı¾Á´> <Îı¾Á´> <Îı¾Á´>