Journal of Guangdong University of Technology ›› 2001, Vol. 18 ›› Issue (4): 30-34.

• Comprehensive Studies • Previous Articles     Next Articles

The VPN Technology of Building Private Network over the Public Network

  

  1. (Faculty of Computer, GDUT, Guangzhou 510090,China)
  • Online:2001-11-02 Published:2001-11-02
[1] CMadson,RGlenn.TheUseofHMAC MD596withinESPandAH. http://www.rfc editor.org/rfc/rfc2403.txt . 199811

[2] CMadson,RGlenn.TheUseofHMAC SHA 196withinESPandAH. http://www.rfc editor.org/rfc/rfc2404.txt . 199811

[3] WTownsley.LayerTwoTunnelingProtocol (L2TP). http://www.rfc editor.org/rfc/rfc2661.txt . 199908

[4] SKent,RAtkinson.SecurityArchitecturefortheInternetProtocol. http://www.rfc editor.org/rfc/rfc2401.txt . 199811

[5] DPiper.TheInternetIPSecurityDomainofInterpretationforISAKMP. http://www.rfc editor.org/rfc/rfc2407.txt . 199811
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!