[1]YLONEN T,LONVICK C.The secure shell(SSH) protocol archtecture[M].USA:RFC4251,2006.
[2]YLONEN T,LONVICK C.The secure shell(SSH) transport layer protocol[M].USA:RFC4253,2006.
[3]YLONEN T,LONVICK C.The secure shell(SSH) authencation protocol[M].USA:RFC4252,2006.
[4]YLONEN T,LONVICK C.The secure shell(SSH) connection protocol[M].USA:RFC4254,2006.
[5]张杰,戴英侠.SSH协议的发展与应用[J].计算机工程,2002,28(10):13-15.
[6]YASIR A,SEAN S.Flexible and scalable public key security for SSH[J].Public Key Infrastructure:EuroPKI,2004(7):1124-1130.
[7]DAN W,DAVID G.Perspectives:improving SSH-style host authentication with multi-path probing[J].IEEE Trans on Communication,2008,25(9):78-80. |