1. Karn P, Simpson W (1999) IETF RFC 2522 Photuris: Session-key management protocol.
http://www.ietf.org/rfc/rfc2522.txt
2. Kaufman C (2005) IETF RFC 4306 Internet Key Exchange Protocol (IKEv2).
http://www.ietf.org/rfc/rfc4306.txt
3. Kent K, Seo K (2005) IETF RFC 4301 Security Architecture for the Internet Protocol.
http://www.ietf.org/rfc/rfc4301.txt
4. Aiello W, Bellovin S, Blase M, Canetti R, Ioannidis J, Keromytis A, Reingold O (2004) Just Fast Keying: Key Agreement In A Hostile Internet. ACM Trans Inf Sys Sec 7
5. Juels A, Brainard J (1999) Client puzzles: a cryptographic countermeasure against connection depletion attacks, pp 151–165