Internet & Intranet Security
-
J. Romkey, "A Nonstandard for Transmission of IP Datagrams over Serial Lines: SLIP," Request for Comments 1055, STD 47, June 1988.
-
W. Simpson, "The Point-to-Point Protocol (PPP)," Request for Comments 1661, STD 51, July 1994.
-
IEEE 802.10, "IEEE Standards for Local and Metropolitan Area Networks: Interoperable LAN/MAN Security (SILS)," 1998.
-
IEEE 802.10c, "Supplements to IEEE Std 802.10, Interoperable LAN/MAN Security (SILS): Key Management (Clause 3)," 1992.
-
A. Valencia, M. Littlewood, and T. Kolar, "Cisco Layer Two Forwarding (Protocol) L2F," Request for Comments 2341, May 1998.
-
C. Scott, P. Wolfe, and M. Erwin, Virtual Private Networks, 2nd Edition, O'Reilly & Associates, Sebastopol, CA, 1998.
-
S. Brown, Implementing Virtual Private Networks, McGraw-Hill, New York, 1999.
-
S. Hanks, et al., "Generic Routing Encapsulation (GRE)," Request for Comments 1701, October 1994.
-
D. Rand, "The PPP Compression Control Protocol (CCP)," Request for Comments 1962, June 1996.
-
W. Simpson, "PPP Challenge Handshake Authentication Protocol (CHAP)," Request for Comments 1994, August 1996.
-
G. Meyer, "The PPP Encryption Control Protocol (ECP)," Request for Comments 1968, June 1996.
-
L. Blunk and J. Vollbrecht, "PPP Extensible Authentication Protocol (EAP)," Request for Comments 2284, March 1998.
-
G. Zorn and S. Cobb, "Microsoft PPP CHAP Extensions," Request for Comments 2433, October 1998.
-
G. S. Pall and G. Zorn, "Microsoft Point-to-Point Encryption (MPPE) Protocol," Request for Comments 2118, April 1998.
-
B. Schneier and P. Mudge, "Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol," Proceedings of ACM Conference on Communcations and Computer Security, November 1998.
-
G. Zorn, "Microsoft PPP CHAP Extensions, Version 2," Request for Comments 2759, January 2000.
-
B. Schneier and P. Mudge, "Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)," June 1999.
-
R. Shea, L2TP: Implementation and Operation, Addison-Wesley, Reading, MA, 1999.
-
W. Townsley, et al., "Layer Two Tunneling Protocol ‘L2TP’," Request for Comments 2661, August 1999.
-
R. Shirey, "Internet Security Glossary," Request for Comments 2828, May 2000.
-
B. S. Davie and Y. Rekhter, MPLS: Technology and Applications, Morgan Kaufmann Publishers, San Francisco, CA, 2000.
-
U. Black, MPLS and Label Switching Networks, Prentice-Hall, Englewood Cliffs, NJ, 2001.
Team-Fly |