INSTYTUT TELEKOMUNIKACJI POLITECHNIKA WARSZAWSKA
暂无分享,去创建一个
[1] William Cheswick,et al. Firewalls and Internet Security , 1994 .
[2] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[3] J. Vitter,et al. Practical Implementations of Arithmetic Coding , 1991 .
[4] Donald E. Eastlake,et al. Randomness Recommendations for Security , 1994, RFC.
[5] John Linn,et al. Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures , 1989, RFC.
[6] D. Brent Chapman,et al. Network (In)Security Through IP Packet Filtering , 1992, USENIX Summer.
[7] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[8] Marcus J. Ranum. Thinking about firewalls V2.0: Beyond perimeter security , 1997, Inf. Secur. Tech. Rep..
[9] Joos Vandewalle,et al. Weak Keys for IDEA , 1994, CRYPTO.
[10] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[11] Darren Reed,et al. Security Considerations for IP Fragment Filtering , 1995, RFC.