NeoMAN: Negotiation Management Method for IKE Protocol Based on X.509
暂无分享,去创建一个
[1] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[2] Sangjoon Park,et al. Internet X.509 Public Key Infrastructure Subject Identification Method (SIM) , 2006, RFC.
[3] Angelos D. Keromytis,et al. Trust management for IPsec , 2002, TSEC.
[4] Carlton R. Davis. Ipsec: Securing Vpns , 2001 .
[5] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[6] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[7] William Stallings,et al. Network security essentials - applications and standards (2. ed.) , 2003 .
[8] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[9] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .