1Bruce Schneier.Applied Cryptography Protocols,Algorithms and Source Code in C[M].北京:机械工业出版社,2000.. 被引量:1
2[1]B Schneier,D Whiting. A Performance Comparison of the Five AES Finalists[C].In:Third AES Candidate Conference,2000 被引量:1
3[2]S Frankel,S Kelly ,R Glenn.The Candidate AES Cipher Algorithms and Their Use With IPsec.INTERNET DRAFT,2000 被引量:1
4[3]N Ferguson,B Schneier. A Cryptographic Evaluation of IPsec.Counterpane Intemet Security,Inc 被引量:1
5[4]V Tzvetkov,E Sanchez. Mobile Virtual Private Network. INTERNET DRAFT, 2000 被引量:1
6[5]S Kent,R Atkinson. Security Architecture for the Intemet Protocol[S].RFC 2401,1998 被引量:1
7[6]W A Simpson. IKE/ISAKMP considered harmful. USENIX Association,1999 被引量:1
8[7]K Matsuura,H Imai.Modified aggressive mode of Internet key exchange resistant against denial-of-service attacks[J].IEICE Transactions on Information and Systems, 2000-05 被引量:1
9[8]P Eronen. Denial of service in public key protocols. Helsinki University of Technology Telecommunications Software and Multimedia Laboratory, 2000 被引量:1