Netinfo Security ›› 2015, Vol. 15 ›› Issue (4): 78-85.doi: 10.3969/j.issn.1671-1122.2015.04.014
Previous Articles Next Articles
SUN Yu-wei(), TONG Xin-hai, ZHANG Lin-hui, YANG Chun-yu
Received:
2015-03-13
Online:
2015-04-10
Published:
2018-07-16
CLC Number:
SUN Yu-wei, TONG Xin-hai, ZHANG Lin-hui, YANG Chun-yu. Research on USB Device Redirection Technology in Cloud Desktop[J]. Netinfo Security, 2015, 15(4): 78-85.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.04.014
[1] | IBM虚拟化与云计算小组. 虚拟化与云计算[M]. 北京,电子工业出版社,2010. |
[2] | Wikipedia.Desktop Virtualization[EB/OL]. . |
[3] | 廖小飞,金海,刘海坤,等. 桌面虚拟化[J]. 中国计算机学会通讯,2011,7(9):26-35. |
[4] | 李承东. 云桌面远程传输协议综述[J]. 现代电信科技,2014,(8):23-26. |
[5] | 李博. 基于SPICE协议的桌面虚拟化客户端的设计与实现[D]. 广州:华南理工大学,2011. |
[6] | SPICE. Spice Project[EB/OL]. |
[7] | 王璇,蔡雄飞,吴志军. 基于Linux的USB设备重定向研究[J]. 武汉工业学院学报,2008,(4):40-42. |
[8] | SPICEwiki. UsbRedir[EB/OL]. . |
[9] | 赖孙荣. 虚拟桌面框架Spice剖析及其客户端的设计与实现[D]. 广州:华南理工大学,2012. |
[10] | Appendix A: Devices that Support Redirection[EB/OL]. , 2015-1-20. |
[11] | 何云超. 基于硬件支持的USB设备虚拟化框架研究[D]. 上海:上海交通大学,2011. |
[12] | GitHub. USB Redirection[EB/OL]. , 2012-10-19. |
[13] | XRDP. USB Redirection[EB/OL]. . |
[14] | Savill J.Remote FX improves the capabilities available to users connecting to Microsoft Virtual Desktop Infrastructure (VDI) environments and eliminates many of the past restrictions[J]. Windows IT Pro, 2011, (8): 54-61. |
[1] | HUANG Wangwang, ZHOU Hua, WANG Daiqiang, ZHAO Qi. Design of Reconfigurable Key Security Authentication Protocol for IoT Based on National Cryptography SM9 [J]. Netinfo Security, 2024, 24(7): 1006-1014. |
[2] | ZHANG Xiaojun, ZHANG Nan, HAO Yunpu, WANG Zhouyang, XUE Jingting. Three-Factor Authentication and Key Agreement Protocol Based on Chaotic Map for Industrial Internet of Things Systems [J]. Netinfo Security, 2024, 24(7): 1015-1026. |
[3] | ZHANG Jiwei, WANG Wenjun, NIU Shaozhang, GUO Xiangkuo. Blockchain Scaling Solutions: ZK-Rollup Review [J]. Netinfo Security, 2024, 24(7): 1027-1037. |
[4] | ZHANG Liqiang, LU Mengjun, YAN Fei. A Cross-Contract Fuzzing Scheme Based on Function Dependencies [J]. Netinfo Security, 2024, 24(7): 1038-1049. |
[5] | DONG Yunyun, ZHU Yuling, YAO Shaowen. High-Quality Full-Size Image Steganography Method Based on Improved U-Net and Hybrid Attention Mechanism [J]. Netinfo Security, 2024, 24(7): 1050-1061. |
[6] | ZHOU Shucheng, LI Yang, LI Chuanrong, GUO Lulu, JIA Xinhong, YANG Xinghua. Context-Based Abnormal Root Cause Algorithm [J]. Netinfo Security, 2024, 24(7): 1062-1075. |
[7] | REN Changyu, ZHANG Ling, JI Hangyuan, YANG Liqun. Research on TTP Extraction Method Based on Pre-Trained Language Model and Chinese-English Threat Intelligence [J]. Netinfo Security, 2024, 24(7): 1076-1087. |
[8] | CAI Manchun, XI Rongkang, ZHU Yi, ZHAO Zhongbin. A Fingerprint Identification Method of Multi-Page and Multi-Tag Targeting Tor Website [J]. Netinfo Security, 2024, 24(7): 1088-1097. |
[9] | XIANG Hui, XUE Yunhao, HAO Lingxin. Large Language Model-Generated Text Detection Based on Linguistic Feature Ensemble Learning [J]. Netinfo Security, 2024, 24(7): 1098-1109. |
[10] | SHEN Xiuyu, JI Weifeng. Optimization of Cost of Edge-Cloud Collaborative Computing Offloading Considering Security [J]. Netinfo Security, 2024, 24(7): 1110-1121. |
[11] | ZHAO Xinqiang, FAN Bo, ZHANG Dongju. Research on APT Attack Defense System Based on Threat Discovery [J]. Netinfo Security, 2024, 24(7): 1122-1128. |
[12] | WEN Wen, LIU Qinju, KUANG Lin, REN Xuejing. Research and Scheme Design of Cyber Threat Intelligence Sharing under Privacy Protection System [J]. Netinfo Security, 2024, 24(7): 1129-1137. |
[13] | LIU Yidan, MA Yongliu, DU Yibin, CHENG Qingfeng. A Certificateless Anonymous Authentication Key Agreement Protocol for VANET [J]. Netinfo Security, 2024, 24(7): 983-992. |
[14] | LUO Ming, ZHAN Qibang, QIU Minrong. A Heterogeneous Cross-Domain Conditional Privacy Protection Ring Signcryption Scheme for V2I Communication [J]. Netinfo Security, 2024, 24(7): 993-1005. |
[15] | LI Zengpeng, WANG Siyang, WANG Mei. Research of Privacy-Preserving Proximity Test [J]. Netinfo Security, 2024, 24(6): 817-830. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||