메뉴 건너뛰기




Volumn 37, Issue 6, 2004, Pages 54-60

Making the Gigabit IPsec VPN Architecture Secure

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET PROTOCOL; VIRTUAL PRIVATE NETWORK;

EID: 17344389739     PISSN: 00189162     EISSN: None     Source Type: Journal    
DOI: 10.1109/MC.2004.30     Document Type: Article
Times cited : (14)

References (9)
  • 1
    • 85008017697 scopus 로고    scopus 로고
    • Gigabit Ethernet to Make Headway Despite User Reservations
    • 17 Feb. www.nwfusion.com/newsletters/lans/2004/0216lan1.html.
    • “Gigabit Ethernet to Make Headway Despite User Reservations,” Network World High Speed LANs Newsletter, 17 Feb. 2004; www.nwfusion.com/newsletters/lans/2004/0216lan1.html.
    • (2004) Network World High Speed LANs Newsletter
  • 2
    • 84888947597 scopus 로고    scopus 로고
    • TCP Performance Re-Visited
    • www.cs.duke.edu/~jaidev/papers/ispass03.pdf.
    • A.P. Foong et al., “TCP Performance Re-Visited;” www.cs.duke.edu/~jaidev/papers/ispass03.pdf.
    • Foong, A.P.1
  • 3
    • 85008021468 scopus 로고    scopus 로고
    • 2003 CSI/FBI Computer Crime and Security Survey
    • www.gocsi.com.
    • Computer Security Institute, “2003 CSI/FBI Computer Crime and Security Survey;” www.gocsi.com.
    • Computer Security Institute
  • 4
    • 84888937496 scopus 로고    scopus 로고
    • Studies and Surveys of Computer Crime
    • www2.norwich.edu/mkabay/methodology/crime_studies.htm.
    • E. Kabay, “Studies and Surveys of Computer Crime;” www2.norwich.edu/mkabay/methodology/crime_studies.htm.
    • Kabay, E.1
  • 5
    • 84888948674 scopus 로고    scopus 로고
    • Analysts: Insiders May Pose Security Threat
    • 15 Oct. www.computerworld.com/securitytopics/security/story/0,10801,64774,00.html.
    • D. Verton, “Analysts: Insiders May Pose Security Threat,” Computerworld, 15 Oct. 2001; www.computerworld.com/securitytopics/security/story/0,10801,64774,00.html.
    • (2001) Computerworld
    • Verton, D.1
  • 6
    • 84888944952 scopus 로고    scopus 로고
    • 27 Feb. www.computoredge.com/sandiego/.
    • Computer Edge Magazine, 27 Feb. 2004; www.computoredge.com/sandiego/.
    • (2004) Computer Edge Magazine
  • 7
    • 17044429822 scopus 로고    scopus 로고
    • AES Candidates: A Survey of Implementations
    • www.tcs.hut.fi/~helger/aes/rijndael.html.
    • H. Lipmaa, “AES Candidates: A Survey of Implementations;” www.tcs.hut.fi/~helger/aes/rijndael.html.
    • Lipmaa, H.1
  • 8
    • 38349038701 scopus 로고    scopus 로고
    • Fast Implementations on the Pentium
    • www.esat.kuleuven.ac.be/~bosselae/fast.html.
    • A. Bosselaers, “Fast Implementations on the Pentium;” www.esat.kuleuven.ac.be/~bosselae/fast.html.
    • Bosselaers, A.1
  • 9
    • 33744979306 scopus 로고    scopus 로고
    • Crypto++ 5.1 Benchmarks
    • 16 July www.eskimo.com/~weidai/benchmarks.html.
    • W. Dai, “Crypto++ 5.1 Benchmarks,” 16 July 2003; www.eskimo.com/~weidai/benchmarks.html.
    • (2003)
    • Dai, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.