Securing IEEE 1588 by IPsec tunnels - An analysis
暂无分享,去创建一个
[1] A. Treytl,et al. Practical application of 1588 security , 2008, 2008 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.
[2] Kang Lee,et al. IEEE 1588 standard for a precision clock synchronization protocol for networked measurement and control systems , 2002, 2nd ISA/IEEE Sensors for Industry Conference,.
[3] Albert Treytl,et al. Secure tunneling of high-precision clock synchronization protocols and other time-stamped data , 2010, 2010 IEEE International Workshop on Factory Communication Systems Proceedings.
[4] G. Gaderer,et al. Boundaries of Ethernet layer 2 hardware timestamping , 2008, 2008 IEEE International Workshop on Factory Communication Systems.
[5] Thilo Sauter,et al. Embedded SynUTC and IEEE 1588 clock synchronization for industrial Ethernet , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).
[6] J.C. Eidson,et al. Spider transparent clock , 2008, 2008 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.
[7] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[8] Paul E. Hoffman,et al. Cryptographic Suites for IPsec , 2005, RFC.
[9] Darryl Veitch,et al. Counter availability and characteristics for feed-forward based synchronization , 2009, 2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] Stephen T. Kent,et al. IP Authentication Header , 1995, RFC.
[12] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[13] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[14] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..