共 34 条
[1]
[Anonymous], 2015, Agence nationale de la securite des systemes d'information: Recommendations for securing networks with IPsec
[2]
APNIC, how to: detect and prevent common data exfiltration attacks
[3]
Babbage S. H., 1995, European Convention on Security and Detection (Conf. Publ. No.408), P161, DOI 10.1049/cp:19950490
[4]
Barnes R., 2023, RFC 9420, DOI [10.17487/RFC9420, DOI 10.17487/RFC9420]
[5]
Barnes Richard., 2015, Request for Comments RFC 7624, DOI DOI 10.17487/RFC7624
[6]
The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I,
2016, 9814
:247-276
[7]
A More Complete Analysis of the Signal Double Ratchet Algorithm
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I,
2022, 13507
:784-813
[8]
Biryukov A, 2000, LECT NOTES COMPUT SC, V1976, P1
[9]
Cohn-Gordon K., 2016, Cryptology ePrint Archive, Report 2016/1013
[10]
Ekdahl P., 2021, Report 2021/236