1 |
C. Madson, R. Glenn, 'The Use of HMAC-SHA-1 within ESP and AH', RFC 2404, November 1998
|
2 |
Insoo Lee, 'Analysis on Elliptic Curve Public Cryptosystems', KISA, December, 1998
|
3 |
RFC 2779('Instant Messaging/Presence Protocol Requirements'), http:// www.ietf.org/rfc/rfc2779.txt
|
4 |
S. Kent. et. al., 'Security architecture for the Internet Protocol', RFC 2401, IETF. 1998.11
|
5 |
C. Madson, R. Glenn, 'The Use of HMAC-MD5 within ESP and AH', RFC 2403, November 1998
|
6 |
RFC 2778('A Model for Presence and Instant Messaging'), http:// www.ietf.org/rfc/rfc2778.txt
|
7 |
'CPIM Presence Information Data Format', http://www.ieft.org/internet-drafts/draft-ietf-impp-cpim-pidf- OO.txt
|
8 |
'Data and Time on the Internet:Timestamps', http://www.ieft.org/internet-drafts/draft-ietf-impp-datetime-04-txt
|
9 |
A.J Menezes and S. A. Vanstone, 'Elliptic Curve Cryptosystems and her mplementation, Journal, on Crytology, PP. 209-224, Autumn, 1993
|
10 |
ECC Toturial, http://www.certicom.com/resources/ecctoturial/ecc_toturial.html, 2001
|
11 |
AIM, http://www.aol.com/aim/homenew.adp
|
12 |
S. Kent, R. Atkinson, 'IP Encapsulating Security Payload(ESP)', RFC 2406, November 1998
|
13 |
'Common Presence and Instant Messaging Message Format', http://www.ietf.org/internet-drafts/draft-ietf-impp-cpim-msgfmt-O3.txt
|
14 |
S. Kent, R. Atkinson, 'IP Authentication Header', RFC 2402, November 1998
|