1Arkko J, Devarapalli V, Dupont F. Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents [R]. 北京:中国国防科技信息中心,2004.
2Baker F, Bose P, Voce D. Routing in a Nested VPN [R].北京:中国国防科技信息中心,2005.
3Hoffman P, Arrko J. IKEv2 Mobility and Multi-homing Working Group[R].北京:中国国防科技信息中心,2004.
4Kamara S, Davis D, Ballard L. An Extensible Platform for Evaluating Security Protocols [R]. 北京:中国国防科技信息中心,2005.
5Kniveton T, Ernst T. Network Mobility Working Group [R].北京:中国国防科技信息中心,2004.
6Pei D, Massey D, Zhang L. Formal Specification of RIP Protocol[R].北京:中国国防科技信息中心,2005.
7United State Department of Defense: About GIG Enterprise Services[R].北京:中国国防科技信息中心,2004.
8Lenstra A K, Verheul E R. Selecting Cryptographic Key Sizes [J]. The Journal of the International Association for Cryptologic Research, 2004, 14 (4): 255-293.
9Kohl J, Neuman C. RFC: The Kerberos Network Authentication Service[R].北京:中国国防科技信息中心,2003.
10Steiner J, Neuman C. An Authentication Service for Open Net-work Systems [R].北京:中国国防科技信息中心,2005.