1[1]BELLARE,MIHIR,KOHNO,TADAYOSHI.Namprempre,chanathip,authenticated encryption in SSH:provably fixing the SSH binary packet protocol[A].Proceedings of the ACM Conference on Computer and Communications Security[C].2002,1-11.
2[2]HARDING,ANDREW.SSL virtual private networks[J].Computers and Security,2003,22(5):416-420.
3[3]ALSHAMSI A,SAITO T.A technical comparison of IPSec and SSL[A].19th International Conference on Advanced Information Networking and Applications[C].2005,395-398.
4[4]BERBECARU D.On Measuring SSL-based Secure Data Transfer with Handheld Devices,2nd International Symposium on Wireless Communication Systems,2005,409-413.
4Cisco lOS Net Flow[EB/OL]. http://www.cisco.com/products_ios_protocol_group_home.html.
5BERBECARU D. On Measuring SSL - based Secure Data Transfer with Handhekd Devivces,2nd International Sym- posium on Wrreless Communication Systems, 2005,409 - 413.
6ALSHAMSI A, SAITO T . A technical comparison of IP- Sec and SSL [ a] . 19th International conference on Ad- vanced Information Networking and Applications [ C ], 2005, 395 "398.
7中国电信综合业务接入网关开放接口协议Version2.02007.
8BERBECARU D. On Measuring SSL-based Secure Data Transfer with Handhekd Devivces[A].2005.409-413.
9ALSHAMSI A,SAITO T. A technical comparison of IPSec and SSL[A].2005.395-398.