Methods and protocols for secure key negotiation using IKE
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. The internet worm: crisis and aftermath , 1989 .
[2] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[3] Hugo Krawczyk,et al. SKEME: a versatile secure key exchange mechanism for Internet , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[4] R. Perlman,et al. An overview of PKI trust models , 1999, IEEE Netw..
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Eugene H. Spafford,et al. Crisis and aftermath , 1989, Commun. ACM.