共 50 条
- [1] Analyzing Internet security protocols [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, 2001, : 149 - 159
- [3] Comparative Analysis of Internet Key Exchange Protocols [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
- [4] Analysis and modification of the Internet Key Exchange Protocols [J]. 信息安全与通信保密, 2005, (07) : 156 - 159
- [5] Security Verification for Authentication and Key Exchange Protocols [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
- [6] Security Verification for Authentication and Key Exchange Protocols [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
- [9] Security of Group Key Exchange Protocols with Different Passwords [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 147 - 152
- [10] Comparative evaluation of successor Protocols to Internet Key Exchange (IKE) [J]. 2005 3rd IEEE International Conference on Industrial Informatics (INDIN), 2005, : 692 - 696