Implementing Internet Key Exchange (IKE)
暂无分享,去创建一个
[1] Stephen T. Kent,et al. IP Authentication Header , 1995, RFC.
[2] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[3] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[4] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[5] William Simpson. IKE/ISAKMP considered harmful , 1999 .
[6] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[7] Craig Metz,et al. PF_KEY Key Management API, Version 2 , 1998, RFC.
[8] Angelos D. Keromytis,et al. Trust Management and Network Layer Security Protocols , 1999, Security Protocols Workshop.
[9] Matt Blaze,et al. The Architecture and Implementation of Network Layer Security in UNIX , 1993, USENIX Security Symposium.
[10] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[11] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[12] Angelos D. Keromytis,et al. Cryptography in OpenBSD: An Overview , 1999, USENIX Annual Technical Conference, FREENIX Track.
[13] William Allen Simpson,et al. Photuris: Session-Key Management Protocol , 1999, RFC.
[14] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[15] Angelos D. Keromytis,et al. Implementing IPsec , 1997, GLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record.