[1]RFC2461.Neighbor Discovery for IP Version 6[S].New York:Network Working Group,1998.
[2]李振强,赵晓宇,马严,等.IPv6技术揭密[M].北京:人民邮电出版社,2006.
[3]杨勋,王江晴.IP地址安全性研究及实验分析[J].武汉工程大学学报,2007,29(3):8386.
[4]Dzvid Zeltserman. A Practical Guide to SNMPv3 and Network Management[M]. New Jersey: PrenticeHall,2000.
[5]Behrouz A F,Fegan S C. TCP/IP Protocol Suite (3rd Edition)[M].Columbus:McGrawHill Education Inc,2006.
[6]Silvia Hagen.IPv6 Essentials[M].CA:Sebastopol, O’Reilly,2006.
[7]Andrew S.Tanenbaum.Computer Networks(4th Edition)[M].New Jersey: PrenticeHall PTR,2003.
[8]Rudolf Ahlswed, Cai N, Li S Y, et al. Network Information Flow[J]. IEEE Trans Inform Theory, 2000,46(4):12041216.
[9]王静.网络编码理论及其应用的研究[D].西安电子科技大学,2008.
[10]Raymond W,Yeung S,Li Y R, et al. Network Coding Theory[M].Boston: now Publishers Inc,2006.
[11]ShuoYen Robert, Yeung R W,Cai N. Linear Network Coding[J].IEEE Trans Inform Theory,2004,49(2):371381.
[12]William Stallings. Cryptography and Network Security(4th)[M]. New Jersey: PrenticeHall,2006.
[13]Raymond W Y. Information Theory and Network Coding[M].New York:Springer,2008.
[14]Joseph Davies. Understanding IPv6[M].Washington: Microsoft Press,2008.
[15]牟丽平.IPv6网络的关键技术研究与改进[D].哈尔滨工程大学,2007.