期刊文献+

IPSEC技术的网络安全模型分析设计

下载PDF
导出
摘要 对在Windows平台下如何实现IPSEC的点对点通信的安全方案进行了探讨,并对具体模块设计进行了分析,为网络安全模型的系统实现提供了参考指导意义。
作者 李杜
机构地区 兰州教育学院
出处 《甘肃科技》 2009年第7期25-26,共2页 Gansu Science and Technology
  • 相关文献

参考文献4

二级参考文献18

  • 1Bruce Schneier.Applied Cryptography Protocols,Algorithms and Source Code in C[M].北京:机械工业出版社,2000..
  • 2[1]B Schneier,D Whiting. A Performance Comparison of the Five AES Finalists[C].In:Third AES Candidate Conference,2000
  • 3[2]S Frankel,S Kelly ,R Glenn.The Candidate AES Cipher Algorithms and Their Use With IPsec.INTERNET DRAFT,2000
  • 4[3]N Ferguson,B Schneier. A Cryptographic Evaluation of IPsec.Counterpane Intemet Security,Inc
  • 5[4]V Tzvetkov,E Sanchez. Mobile Virtual Private Network. INTERNET DRAFT, 2000
  • 6[5]S Kent,R Atkinson. Security Architecture for the Intemet Protocol[S].RFC 2401,1998
  • 7[6]W A Simpson. IKE/ISAKMP considered harmful. USENIX Association,1999
  • 8[7]K Matsuura,H Imai.Modified aggressive mode of Internet key exchange resistant against denial-of-service attacks[J].IEICE Transactions on Information and Systems, 2000-05
  • 9[8]P Eronen. Denial of service in public key protocols. Helsinki University of Technology Telecommunications Software and Multimedia Laboratory, 2000
  • 10[9]K Hamzeh,G Pal1,W Verthein et al. Point-to-Point Tunneling Protocol[S].RFC 2637,1999

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部