Tài liệu tham khảo |
Loại |
Chi tiết |
[1] C. M. Kozierok, "IPSec Overview, History and Standards," The TCP/IP Guide, 20 9 2005. [Online]. Available:http://www.tcpipguide.com/free/t_IPSecOverviewHistoryandStandards.htm |
Sách, tạp chí |
Tiêu đề: |
IPSec Overview, History and Standards |
|
[2] T. T. A. Tuan, "Giao thức IPSEC trong lĩnh vực an toàn thông tin," Viblo, 27 11 2017. [Online]. Available: https://viblo.asia/p/giao-thuc-ipsec-trong-linh-vuc-an-toan-thong-tin-oOVlYdPQZ8W |
Sách, tạp chí |
Tiêu đề: |
Giao thức IPSEC trong lĩnh vực an toàn thông tin |
|
[3] L. S. Cardoso, "Internet security and critical infrastructures," 2004. [Online]. Available: http://www.eurescom.de/message/messagesep2004/Internetsecurityandcritical infrastructure.asp |
Sách, tạp chí |
Tiêu đề: |
Internet security and critical infrastructures |
|
[4] V. M. I. a. R. D. Williams, "Taxonomies of attacks and vulnerabilities in computer systems," IEEE Communications Surveys & Tutorials, vol. 10, no. 1, pp. 6-19, 2008 |
Sách, tạp chí |
Tiêu đề: |
Taxonomies of attacks and vulnerabilities in computer systems |
|
[6] T. Wilson, "Targeted attacks on the rise," DarkReading.com, 18 4 2007. [Online]. Available:http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID=208804471 [7] CERT, “Overview of attack trends,” CERT? Coordination Center, Carnegie MellonUniversity, Tech. Rep., 2002 |
Sách, tạp chí |
Tiêu đề: |
Targeted attacks on the rise," DarkReading.com, 18 4 2007. [Online]. Available: http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID=208804471 [7] CERT, “Overview of attack trends |
|
[8] L. A. Gordon and I. Computer Security, “2004 csi/fbi computer crime and security survey,” 2004, (San Francisco, Calif.). [Online].Available: http://i.cmpnet.com/gocsi/db%5Farea/pdfs/fbi/FBI2004.pdf |
Sách, tạp chí |
Tiêu đề: |
2004 csi/fbi computer crime and security survey |
|
[9] T. Grandison and M. Sloman, “A survey of trust in internet applications,” IEEE Communications Surveys & Tutorials, vol. 3, no. 4, pp. 2–16, 2000 |
Sách, tạp chí |
Tiêu đề: |
A survey of trust in internet applications |
|
[10] A. Chakrabarti and G. Manimaran, “Internet infrastructure security: a taxonomy,” Network, IEEE, vol. 16, no. 6, pp. 13–21, 2002 |
Sách, tạp chí |
Tiêu đề: |
Internet infrastructure security: a taxonomy |
|
[11] M. Al-Kuwaiti, N. Kyriakopoulos, and S. Hussein, “A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability,” IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 106–124, 2009 |
Sách, tạp chí |
Tiêu đề: |
A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability |
|
[13] Y. Chen and H. Chen, “Neuronet: An adaptive infrastructure for network security,” Journal of Information, Intelligence and Knowledge, vol. 1, no. 2, pp. 143–168, 2009 |
Sách, tạp chí |
Tiêu đề: |
Neuronet: An adaptive infrastructure for network security |
|
[14] S. Kent and K. Seo, “Rfc 4301:security architecture for the internet protocol,” 2005. [Online]. Available: http://www.rfc-editor.org/rfc/rfc4301.txt |
Sách, tạp chí |
Tiêu đề: |
Rfc 4301:security architecture for the internet protocol |
|
[15] A. Callado, C. K. G. Szab, B. P. Gero, J. Kelner, S. Fernandes, and D. Sadok, “A survey on internet traffic identification,” IEEE Communications Surveys & Tutorials, vol. 11, no.3, 2009 |
Sách, tạp chí |
Tiêu đề: |
A survey on internet traffic identification |
|
[16] P. Li, M. Salour, and X. Su, “A survey of internet worn detection and containment,” IEEE Communications Surveys & Tutorials, vol. 10, no. 1, pp. 20–35, 2008 |
Sách, tạp chí |
Tiêu đề: |
A survey of internet worn detection and containment |
|
[19] IPsec performance, OpenWRT project webpage (accessed 17.05.16), https://wiki.openwrt.org/doc/howto/vpn.IPsec.performance |
Link |
|
[54] Weaver, N., and Wawrzynek, J.: ‘High performance, compact AES implementations in Xilinx FPGAs’, 27 September 2002,http://www.cs.berkeley.edu/nweaver/sfra/rijndael.pdf, accessed June 2005 |
Link |
|
[58] National Institute of Standards and Technology.: ‘Secure hash standard’. Federal Information Processing Standards Publication (FIPS PUB) 180-2, 1 August 2002, with changes, 25 February 2004, http://www.csrc.nist.gov/publications/fips/fips180-2/ fips180- 2withchangenotice.pdf, accessed June 2005 |
Link |
|
[80] Zibin, D., and Ning, Z.: ‘FPGA Implementation of SHA-1 algorithm’. Proc. 2003 5th Int. Conf. ASIC, ASICON 2003, Beijing, China, October 2003, Vol. 2, pp. 1321–1324 [81] Altera Corporation: ‘Stratix II device handbook, volume 2’,http://www.altera.com/literature/hb/stx2/stratix2_handbook.pdf, May 2005 accessed June 2005 |
Link |
|
[85] NIST Special Publication 800-38A, 2001 ED, Version 1, Recommendation for Block Cipher Modes of Operation—Methods and Techniques, December 2001, Natl. Inst.Stand. Technol. [Web page], http://www.csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf |
Link |
|
[86] D. McGrew, J. Viega, The Galois/Counter Mode of Operation (GCM), Natl. Inst. Stand. Technol. [Web page], http://www.csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-revised-spec.pdf, May 31, 2005 |
Link |
|
[87] National Institute of Standards and Technology and Communications Security Establishment, Implementation Guidance for FIPS Pub. 140-2 and the Cryptographic Module Validation Program, Natl. Inst. Stand. Technol. [Web page], http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf |
Link |
|