1 |
D. Rand, 'The PPP Compression Control Protocol (CCP)', RFC 1962, June 1996
|
2 |
G. McGregor, 'The PPP Internet Protocol Control Protocol (IPCP)', RFC 1332, May 1992
|
3 |
W. Simpson, 'PPP LCP Extensions', RFC 1548, January 1994
|
4 |
W. Simpson, 'PPP Challenge Handshake Authentication Protocol (CHAP)', RFC 1994, August 1996
|
5 |
K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, G. Zorn, 'Point-to-Point Tunneling Protocol (PPTP)', RFC 2637, July 1999
|
6 |
W. Simpson, 'The Point-to-Point Protocol (PPP)', RFC 1661, July 1994
|
7 |
Li C, Li S, Zhang D, Chen G, 'Cryptanalysis of a data security protection scheme for VoIP', IEE Proceedings Vision, Vol. 153, No. 01, pp. 1-10, 2006.2
DOI
ScienceOn
|
8 |
Steven M. Bellovin, Susan Landau, Matt Bla, 'The real national-security needs for VoIP', Communications of the ACM, Vol. 48 No. 11 pp. 120-120,2005.11
DOI
ScienceOn
|
9 |
J. Postel, 'Internet Protocol', RFC 760, January 1980
|
10 |
G. Pall, G. Zorn, 'Microsoft Point-To-Point Encryption (MPPE) Protocol', RFC 3078, March 2001
|