[ ÕÔ»ªÑÞ ]¡ª¡ª(2005-3-26) / ÒÑÔÄ45128´Î
2ÍõÔÆ±ó.ITÒµµÄ֪ʶ²úȨ[M].±±¾©£º¾¼Ã¹ÜÀí³ö°æÉç,2001.4.303Ò³
3ÕÅÆ½.ÍøÂç֪ʶ²úȨ¼°ÆäÏà¹Ø·¨ÂÉÎÊÌâ͸Îö[M].¹ãÖÝ£º¹ãÖݳö°æÉç,2000.10.
4³ÂÃÀÕÂ.Áõ½±ò.Êý×Ö»¯¼¼ÊõµÄ֪ʶ²úȨ±£»¤[M].±±¾©£ºÖªÊ¶²úȨ³ö°æÉç,2000.5
5Ѧºç£®ÍøÂçʱ´úµÄ֪ʶ²úȨ·¨[M]£®±±¾©£º·¨Âɳö°æÉç,2000.6.
6ÊÙ²½¡¢ÕŻۡ¢À.ÐÅϢʱ´ú֪ʶ²úȨ½Ì³Ì[M].±±¾©£º¸ßµÈ½ÌÓý³ö°æÉç,2003.8.
7ÁõÖ¾ÓÂ.ÍøÂçÓòÃûµÄ֪ʶ²úȨ±£»¤[J].Ç鱨ÔÓÖ¾.2003£¨6£©.7Ò³
8ÄÇÁ¦.Öܺì.ÓòÃûµÄ·¨Âɱ£»¤[J].ÄϾ©¾¼ÃѧԺѧ±¨.2002£¨1£©.66Ò³
9л¹Ú±ó.´ÓÓòÃûµÄ·¨Âɱ£»¤¿´ÖªÊ¶²úÈ¨ÖÆ¶ÈµÄ·¢Õ¹[J].·¨Ñ§ÆÀÂÛ.2001£¨3£©.61Ò³
10Íõº£Ó¢.ÓòÃû·¨Âɱ£»¤Ì½Îö[J].Öй²¸£½¨Ê¡Î¯µ³Ð£Ñ§±¨.2000£¨4£©.39Ò³
11ÕŶ«Ã·.ÂÛ»¥ÁªÍøÓòÃûµÄ·¨Âɱ£»¤[J].¸£½¨Ê¦·¶´óѧѧ±¨£¨ÕÜѧÉç»á¿ÆÑ§°æ£©.2000£¨3£©.39Ò³
12³Â¾´È«.ÂÛÓòÃûµÄ֪ʶ²úȨ±£»¤[J].Ç鱨¿ÆÑ§.2000£¨12£©.
13ÀîÏþ°².ÂÛÍøÂçÓòÃûµÄ֪ʶ²úȨ±£»¤[J].ƽԴóѧѧ±¨.2000.2
14Íõ»Ô.µç×ÓÉÌÎñÖеÄÓòÃûÓë֪ʶ²úȨµÄ¹ØÏµ¼°·¨Âɱ£»¤[J].¸ÊËàÐÐÕþѧԺѧ±¨.2003£¨4£©.82Ò³
15°ØÀö.ÓòÃûºÍÉ̱êµÄ³åÍ»¼°ÎÒ¹úÓòÃûÖÆ¶ÈµÄÍêÉÆ[J].µ±´ú·¨Ñ§.2003£¨3£©.81Ò³
16³Â½.ÁÖÐý.ÎÒ¹úÏÖÐз¨ÂɶÔÓòÃû¾À·×µÄ½â¾öºÍÍêÉÆ[J].ÂÉʦÊÀ½ç.2000£¨7£©.21Ò³
17ÖÜÇ廪.ÕÅÕ×·ã.¶ÔÓòÃûÎÊÌâµÄ·¨ÂÉ˼¿¼[J].µ±´ú·¨Ñ§.2003£¨12£©.151Ò³
18·ëÄÈ.ÓòÃû×¢²á¾À·×µÄ·¨ÂÉÎÊÌâ[J].µ±´ú·¨Ñ§.2003£¨5£©.120Ò³
19Íõºìƽ.ÖÐÎÄÓòÃû¹ÜÀíȨÕù¶áÕ½À¿ªá¡Ä»[J].ÁËÍû.2001.4£¨14£©.
20Íõ°ëÄÁ.ÇÀ×¢ÓòÃûÐÐΪ¼°Æä·¨ÂÉÊÊÓÃ[J].·¨ÂÉÊÊÓÃ.2001£¨9£©.
21ФÀèÃ÷.ÂÛÓòÃûµÄ֪ʶ²úȨ±£»¤[J].ÂÉʦÊÀ½ç.1999£¨4£©.
22ºéÓѽ.ÎöÖйúÓòÃûÕùÒé´¦Àí³ÌÐò[J].ÂÉʦÊÀ½ç.2001£¨12£©
23Klotz, Robert J. The politics of Internet communication .2004
24Cheung,Steven.An intrusion tolerance approach for protecting network infrastructures .2000
25Edwards, Lilian ed. Law and the Internet : a framework for electronic commerce .2000
26Hagemann,Nicole.Rechtsschutz gegen Kennzeichenmissbrauch unter Ber¨¹cksichtigung der Internet-Domain-Name-Problemati.2001
27Wang,Xunhua. Improving information system security through removing single point of attack.2002
28Chen,Yu.IDNS [microform] : an efficient approach to portability and
mobility support.2003
×ܹ²4Ò³¡¡¡¡[1] [2] [3] 4
ÉÏÒ»Ò³¡¡¡¡