Performance Implications of IPSec Deployment
暂无分享,去创建一个
[1] Hilarie K. Orman,et al. The OAKLEY Key Determination Protocol , 1997, RFC.
[2] Derrell Piper,et al. The Internet IP Security Domain of Interpretation for ISAKMP , 1998, RFC.
[3] Mícheál Ó Foghlú,et al. Overhead Issues for Local Access Points in IPSec enabled VPNs , 2003 .
[4] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[5] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[6] Rob Adams,et al. The ESP CBC-Mode Cipher Algorithms , 1998, RFC.
[7] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[8] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[9] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[10] Cheryl Madson,et al. The Use of HMAC-MD5-96 within ESP and AH , 1998, RFC.
[11] Sheila Frankel,et al. The AES-CBC Cipher Algorithm and Its Use with IPsec , 2003, RFC.
[12] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.