Journal of Guangdong University of Technology ›› 2004, Vol. 21 ›› Issue (4): 31-36.

• Comprehensive Studies • Previous Articles     Next Articles

The VPN Technology of Building Private Network over the Public Network

  

  1. (1. Faculty of Computer, Guangdong University of Technology, Guangzhou 510090,China; 2. Wujing Senior High School,Changzhou 213021,China)
  • Online:2004-11-03 Published:2004-11-03
[1] WTownsley.LayerTwoTunnelingProtocol(L2TP)[DB OL]. http: www.rfc editor.org rfc rfc2661.txt . 2003

[2] SKent,RAtkinson.SecurityArchitecturefortheInternetProtocol[DB OL]. http: www.rfc editor.org rfc rfc2401.txt . 2003

[3] DPiper.TheInternetIPSecurityDomainofInterpretationforISAKMP[DB OL]. http: www.rfc editor.org rfc rfc2407.txt . 2003

[4] CMadson,RGlenn.TheUseofHMAC MD5 96withinESPandAH[DB OL]. http: www.rfc editor.org rfc rfc2403.txt . 2003

[5] CMadson,RGlenn.TheUseofHMAC SHA 1 96withinESPandAH[DB OL]. http: www.rfc editor.org rfcrfc2404.txt . 2003
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!