A technical comparison of IPSec and SSL
暂无分享,去创建一个
[1] Eric Rescorla,et al. SSL and TLS: Designing and Building Secure Systems , 2000 .
[2] Cheryl Madson,et al. The Use of HMAC-MD5-96 within ESP and AH , 1998, RFC.
[3] Stephen T. Kent,et al. IP Authentication Header , 1995, RFC.
[4] Michael Thomas,et al. Kerberized Internet Negotiation of Keys (KINK) , 2006, RFC.
[5] Stephane Beaulieu,et al. A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers , 2004, RFC.
[6] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[7] Sheila Frankel. Demystifying The Ipsec Puzzle , 2001 .
[8] Ari Huttunen,et al. Negotiation of NAT-Traversal in the IKE , 2005, RFC.
[9] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[10] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[11] Cheryl Madson,et al. The Use of HMAC-SHA-1-96 within ESP and AH , 1998, RFC.