[1]KENT S,ATKINSON R.Security architecture for the internet protocol[M].USA:Request For Comments,1998.
[2]PIPER D.The internet IP security domain of interpretation for ISAKMP[M].USA:Request For Comments,1998.
[3]MAUGHAN D,SCHERTLER M,SCHNEIDER M.Internet security association and key management protocol(ISAKMP)[M].USA:Request For Comments,1998.
[4]HARKINS D.CARREL D.The internet key exchange (IKE)[M].USA:Request For Comments,1998.
[5]ORMAN H.The OAKLEY key determination protocol[M].USA:Request For Comments,1998.
[6]WILLIAM S.Cryptography and network security principles and practice[M].北京:电子工业出版社,2004.
[7]BRUCE S.应用密码学[M].吴世忠,译.北京:机械工业出版社,2000.
[8]王育民,刘建伟.通信网的安全——理论与技术[M].西安:西安电子科技大学出版社,2002.
[9]NAGANAND D.IPSEC:新一代因特网安全标准[M].北京:机械工业出版社,1999.
[10]DAVID L C.IT manager's guide to virtual private networks[M].Newyork:Computing McGraw-Hill,1999. |