Journal of Guangdong University of Technology ›› 2001, Vol. 18 ›› Issue (4): 30-34.
• Comprehensive Studies • Previous Articles Next Articles
[1] CMadson,RGlenn.TheUseofHMAC MD596withinESPandAH. http://www.rfc editor.org/rfc/rfc2403.txt . 199811[2] CMadson,RGlenn.TheUseofHMAC SHA 196withinESPandAH. http://www.rfc editor.org/rfc/rfc2404.txt . 199811[3] WTownsley.LayerTwoTunnelingProtocol (L2TP). http://www.rfc editor.org/rfc/rfc2661.txt . 199908[4] SKent,RAtkinson.SecurityArchitecturefortheInternetProtocol. http://www.rfc editor.org/rfc/rfc2401.txt . 199811[5] DPiper.TheInternetIPSecurityDomainofInterpretationforISAKMP. http://www.rfc editor.org/rfc/rfc2407.txt . 199811 |
No related articles found! |
|