1 |
S, Kent 'Security Architecture for the Internet Protocol', RFC 2401, November, 1998
|
2 |
Charlie Kaufman 'Internet Key Exchange (IKEv2) Protocol', draft-ietf-ipsec-ikev2-17.txt. September2004
|
3 |
Diffie, W., and Hellman M., 'New Directions in Cryptography', IEEE Transactions on Information Theory, V.IT-22, n. 6, June 1977
|
4 |
R. Housley, W. Polk, W. Ford, and D. Solo. 'Internet X.509 public key infrastructure certificate and certicate revocation list (CRL) profile.' RFC 3280, Internet Engineering Task Force, April 2002
|
5 |
Krawczyk, H., 'SKEME: A Versatile Secure Key Exchange Mechanism for Internet', from IEEE Proceedings of the 1996 Symposium on Network and Distributed Systems Security
|
6 |
H. Orman 'The Oakley Key Determination Protocol', RFC 2412, November 1998
|
7 |
D. Harking and D. Carrel, 'The Internet Key Exchange', RFC 2409, November 1998
|
8 |
D. Maughan, 'Internet Security Association and Key Management Protocol', RFC 2408, November, 1998
|
9 |
D. Paper, 'The Internet IP Security Domain of Interpretation for ISAKMP', RFC 2407, November, 1998
|
10 |
S, Kent and R. Atkinson, 'IP Encapsulating Security Payload(ESP),', RFC-2406 November 1998
|
11 |
S, Kent and R. Atkinson, 'IP Authentication Header,', RFC 2402, November 1998
|