5H Krawczyk,M Bellare,R Canetti.HMAC: Keyed-hashing for message authentication[].Internet RFC.1997
6Stefan Savage,David Wetherall,Anna Karlin et al.Practical Network Support for IP Traceback[].Proceedings of the ACM SIGCOMM Conference.2000
7Perrig A,Canetti R,Song D,and Tygar D.Efficient and secure source authentication for multicast[].Proceedings of Network and Distributed System Security Symposium.2001