1Bruce Schneier.Applied Cryptography Protocols,Algorithms and Source Code in C[M].北京:机械工业出版社,2000..
2[1]B Schneier,D Whiting. A Performance Comparison of the Five AES Finalists[C].In:Third AES Candidate Conference,2000
3[2]S Frankel,S Kelly ,R Glenn.The Candidate AES Cipher Algorithms and Their Use With IPsec.INTERNET DRAFT,2000
4[3]N Ferguson,B Schneier. A Cryptographic Evaluation of IPsec.Counterpane Intemet Security,Inc
5[4]V Tzvetkov,E Sanchez. Mobile Virtual Private Network. INTERNET DRAFT, 2000
6[5]S Kent,R Atkinson. Security Architecture for the Intemet Protocol[S].RFC 2401,1998
7[6]W A Simpson. IKE/ISAKMP considered harmful. USENIX Association,1999
8[7]K Matsuura,H Imai.Modified aggressive mode of Internet key exchange resistant against denial-of-service attacks[J].IEICE Transactions on Information and Systems, 2000-05
9[8]P Eronen. Denial of service in public key protocols. Helsinki University of Technology Telecommunications Software and Multimedia Laboratory, 2000
10[9]K Hamzeh,G Pal1,W Verthein et al. Point-to-Point Tunneling Protocol[S].RFC 2637,1999