Using end-to-end data encryption to secure SIP device configuration
暂无分享,去创建一个
[1] Maurizio Dusi,et al. Detecting HTTP Tunnels with Statistical Mechanisms , 2007, 2007 IEEE International Conference on Communications.
[2] Athanasios V. Vasilakos,et al. DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.
[3] Athanasios V. Vasilakos,et al. Peer-to-Peer Media Streaming: Insights and New Developments , 2011, Proceedings of the IEEE.
[4] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[5] Florian Schintke,et al. Peer-to-Peer Computing , 2010, Euro-Par.
[6] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[7] W. Richard Stevens,et al. Unix network programming , 1990, CCRV.
[8] Sean Turner,et al. Transport Layer Security , 2014, IEEE Internet Computing.
[9] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[10] Xudong Chen,et al. Parallelization of RSA Algorithm Based on Compute Unified Device Architecture , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.
[11] James F. Doyle,et al. Peer-to-Peer: harnessing the power of disruptive technologies , 2001, UBIQ.
[12] 권태경,et al. SSL Protocol 기반의 서버인증 , 2003 .
[13] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.