期刊文献+

基于IP技术的端对端通信网络安全模型分析设计 被引量:16

Design of Peer-To-Peer Communication Network Security Model based on IP Technology
下载PDF
导出
摘要 本文对在Windows平台下如何实现IPSEC的端对端通信的安全方案进行了探讨,并对具体模块设计进行了分析,为网络安全模型的系统实现提供了指导意义。 This paper analyzes the design problem of peer-to- peer communication network security model based on IP technology, designs the material function module.
作者 林永和
出处 《微计算机信息》 北大核心 2005年第10X期1-2,共2页 Control & Automation
基金 教育部骨干教师资助计划
关键词 IPSEC 网络安全 端对端 IPSEC network security peer-to-peer
  • 相关文献

参考文献4

二级参考文献18

  • 1Bruce Schneier.Applied Cryptography Protocols,Algorithms and Source Code in C[M].北京:机械工业出版社,2000..
  • 2[1]B Schneier,D Whiting. A Performance Comparison of the Five AES Finalists[C].In:Third AES Candidate Conference,2000
  • 3[2]S Frankel,S Kelly ,R Glenn.The Candidate AES Cipher Algorithms and Their Use With IPsec.INTERNET DRAFT,2000
  • 4[3]N Ferguson,B Schneier. A Cryptographic Evaluation of IPsec.Counterpane Intemet Security,Inc
  • 5[4]V Tzvetkov,E Sanchez. Mobile Virtual Private Network. INTERNET DRAFT, 2000
  • 6[5]S Kent,R Atkinson. Security Architecture for the Intemet Protocol[S].RFC 2401,1998
  • 7[6]W A Simpson. IKE/ISAKMP considered harmful. USENIX Association,1999
  • 8[7]K Matsuura,H Imai.Modified aggressive mode of Internet key exchange resistant against denial-of-service attacks[J].IEICE Transactions on Information and Systems, 2000-05
  • 9[8]P Eronen. Denial of service in public key protocols. Helsinki University of Technology Telecommunications Software and Multimedia Laboratory, 2000
  • 10[9]K Hamzeh,G Pal1,W Verthein et al. Point-to-Point Tunneling Protocol[S].RFC 2637,1999

共引文献17

同被引文献61

引证文献16

二级引证文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部