Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX
暂无分享,去创建一个
[1] D. Brent Chapman,et al. Network (In)Security Through IP Packet Filtering , 1992, USENIX Summer.
[2] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[3] Moti Yung,et al. Systematic Design of a Family of Attack-Resistant Authentication Protocols , 1993, IEEE J. Sel. Areas Commun..
[4] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[5] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[6] Moti Yung,et al. The KryptoKnight family of light-weight protocols for authentication and key distribution , 1995, TNET.
[7] Gene Tsudik. Message authentication with one-way hash functions , 1992, CCRV.
[8] Matt Blaze,et al. The Architecture and Implementation of Network Layer Security in UNIX , 1993, USENIX Security Symposium.
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] Jon Postel,et al. Internet Protocol , 1981, RFC.