An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises
暂无分享,去创建一个
[1] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[2] Andrew G. Mason,et al. Cisco Secure Virtual Private Networks , 2001 .
[3] Carlton R. Davis. Ipsec: Securing Vpns , 2001 .
[4] E. Tronci,et al. 1996 , 1997, Affair of the Heart.
[5] Laura Knapp. Virtual Private Network Performance , 2001 .
[6] Andrew Mason. CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) (2nd Edition) , 2004 .
[7] Vanessa P. Ambers,et al. Installation, Configuration and Operational Testing of a PKI Certificate Server and Its Supporting Services , 2004 .
[8] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[9] Carlisle M. Adams,et al. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.
[10] Jackie Sieben,et al. Vpns: A Beginner's Guide , 2001 .
[11] Mark Merkow. Virtual Private Networks For Dummies , 1999 .
[12] Cheryl Madson,et al. The Use of HMAC-SHA-1-96 within ESP and AH , 1998, RFC.