1[2]Elkeelany O, et al., Performance analysis of IPSec protocol:encryption and authentication. IEEE Communications Conference (ICC 2002), 2002:1164-1168
2[3]Xenakis C, Merakos L. Security in third generation mobile networks.Computer Communications,2004 ;27 (7): 638-650