[1]
Aboba, B., & Dixon, W. (2004). IPsec-network address translation (NAT) compatibility requirements, RFC3715.
DOI: 10.17487/rfc3715
Google Scholar
[2]
Doraswamy, N., & Harkins D. (2003). IPsec: the new security standard for the internet, intranets, and virtual private networks. London: Prentice-Hall.
Google Scholar
[3]
Sebastian Marius Rosu, Marius Marian Popescu the virtual enterprise network based on IPSec VPN Solutions and Management. (LJACSA) International Journal of Advanced Computer Science and Applications. Vol 3, No. 11, (2012).
DOI: 10.14569/ijacsa.2012.031105
Google Scholar
[4]
W. Stallings, Cryptography and network security: Principles and Practics. Prentice Hall, (1998).
Google Scholar
[5]
T. Huang, G.Q. Wu and J. Wei, Runtime monitoring composite Web services through state full aspect extension, Journal of Computer Science and Technology, vol. 24(2), pp.294-308, (2009).
DOI: 10.1007/s11390-009-9225-4
Google Scholar
[6]
Dierks, T., & Rescorla, E. (2008). The transport layer security(TLS) protocol, RFC 5246.
DOI: 10.17487/rfc5246
Google Scholar
[7]
Doraswamy, N., & Harkins, D. (2003). IPSec: The new security standard for the internet, intranets, and virtual private networks. London: Prentice-Hall.
Google Scholar
[8]
Errata K.S. (2005). IP encapsulating security payload, RFC 4303.
Google Scholar
[9]
Feilner, M. (2006). OpenVPN: Building and integrating virtual private networks. Packt: Birmingham.
Google Scholar
[11]
Hamzel, K., Pall, G., Verthein, W., Taarud, J., Little, & Zorn, G, (1999). Point-to-Point tunneling protocol(PPTP), RFC 2637.
DOI: 10.17487/rfc2637
Google Scholar
[12]
Jim, B., & Srinivasan, S. (2003). Simple mobility support for IPsec tunnel mode. Vehicular Technology Conference, 3.
DOI: 10.1109/vetecf.2003.1285375
Google Scholar
[13]
Kent, S. (2005). IP authentication header, RFC 4302.
Google Scholar
[14]
Loshin, P. (2003). IPv6: theory, protocol, and practice(and ed. ). United States of America: Elsevier.
Google Scholar
[15]
Maughan, D., Schertler, M., Schneider, M., & Turner, J. (1998). Internet security association and key management protocol(ISAKMP), RFC 2408.
DOI: 10.17487/rfc2408
Google Scholar
[16]
Perkins, C. (1996). Minimal encapsulation within IP, RFC (2004).
Google Scholar
[17]
Thayer, R., Doraswamy, N., & Glenn, R. (1998). IP security document roadmap, RFC (1994).
DOI: 10.17487/rfc2411
Google Scholar