|
1.Alcatel Networks Corp.(2000),Understanding the IPSec Protocol Suite http://www.alcatel.com/2.Angelos D.Keromytis ,John Ioannidis,Joan M. Smith (1997)Implementing IPSec3.C. Madson and N. Doraswamy(1998), The Use of HMAC-SHA-1-96 within ESP and AH, RFC2404, IETF 4.C. Madson and R. Glenn(1998),The Use of HMAC-MD5-96 within ESP and AH,RFC 2403,IETF5.Carlton R. Davis(2001),IPSec Securing VPNs ,Osborne6.D. Harkins, D. Carrel(1998),The Internet Key Exchange (IKE),RFC 2409,IETF 7.D. Maughan, M. Schertler, M. Schneider and J. Turner(1998), Internet Security Association and Key Management Protocol, RFC2408,IETF 8.D. McDonald ,C. Metz ,B. Phan (1998),PF_KEY Key Management API, Version 2 ,RFC 2367,IETF9.D. Piper(1998), The Internet IP Security Domain of Interpretation for ISAKMP, RFC2407,IETF 10.FreeS/WAN official Home Page,http://www.freeswan.org11.H. Krawczyk ,M. Bellare ,R. Canetti (1997),HMAC: Keyed-Hashing for Message Authentication ,RFC 2104,IETF12.H. Orman(1998),The OAKLEY Key Determination Protocol ,RFC 2412,IETF13.James S. Tiller, Jim S. Tiller(2000),A Technical Guide to Ipsec Virtual Private Networks ,Auerbach Publications14.Jong-Hyeon Lee (1997),A Survey on IPSEC Key Management Protocols15.Martin Murhammer, et al.(1999) ,A Comprehensive Guide to Virtual Private Networks ,IBM http://www.redbooks.ibm.com16.Naganand Doraswamy, Dan Harkins (1999),Ipsec: The New Security Standard for the Internet,Intranets,and Virtual Private Networks,Prentice Hall PTR 17.Niklas Hallqvist and Angelos D.Keromytis ,Implementing Internet Key Exchange(IKE)18.P. Karn ,P. Metzger and W. Simpson (1995),The ESP Triple DES Transform ,RFC 1851,IETF19.P. Karn,P. Metzger and W. Simpson (1995),The ESP DES-CBC Transform,RFC 1829,IETF20.Paul Ferguson and Geoff Huston(1998),What is a VPN?, http://www.employees.org/~ferguson/vpn.pdf21.Peter Loshin, Pete Loshin (1999),Big Book of IPsec RFCs: Internet Security Architecture, Morgan Kaufmann Publishers22.R. Pereira and R. Adams (1998),The ESP CBC-Mode Cipher Algorithms,RFC 2451,IETF23.R. Thayer, N. Doraswamy and R. Glenn(1998), IP Security Document Roadmap, RFC2411,IETF24.Radia Perlman and Charlie Kaufman (2000),Key Exchange in IPSec:Analysis of IKE Security Solution ,IEEE Internet Computer Nov、 Dec25.S. Frankel,S. Kelly(2001),The AES Cipher Algorithm and Its Use With IPsec, Internet Draft ,IETF 26.S. Frankel,S. Kelly(2001),The HMAC-SHA-256-96 Algorithm and Its Use With IPsec ,Internet Draft ,IETF27.S. Kent and R. Atkinson(1998) ,IP Authentication Header ,RFC 2402,IETF28.S. Kent and R. Atkinson(1998), IP Encapsulating Security Payload,RFC2406,IETF29.S. Kent and R. Atkinson(1998),Security Architecture for the Internet Protocol, RFC2401,IETF30.Sheila Frankel(2001),Demystifying the Ipsec Puzzle ,Artech House31.T. Braun, M. Günter, M. Kasumi, I. Khalil(1999), Virtual Private Network Architecture 32.何美秀(2000),VPN服務介紹,中華電信訓練所網路教學課程33.林育德(2001), 在VPN路由器上設計並實作IKE,大同大學碩士論文34.高笙庭(2000), 利用IPSEC達成封包傳輸隱匿之目的,台灣大學碩士論文 35.張智勝.陳伯偉譯(2001)Douglas Comer原著 ,TCP/IP互連網路-第四版,全華科技圖書公司36.楊慶隆(1997),IPSec機制探討,網路通訊雜誌,民88.0837.應中龍(2001),在VPN路由器中設計並實作IPSEC, 大同大學碩士論文
|