1. Bellovin, S.: Problem areas for the IP security protocols. In: Proceedings of the Sixth USENIX UNIX Security Symposium (July 1996), Also at
ftp://ftp.research.att.com/dist/smb/badesp.ps
2. Ferguson, N., Schneier, B.: A cryptographic evaluation of ipsec. Counterpane Internet Security, Inc. (1999), available at
http://www.counterpane.com/ipsec.html
3. Guttman, J.D.: Filtering postures: Local enforcement for global policies. In: Proceedings, 1997 IEEE Symposium on Security and Privacy, pp. 120–129. IEEE Computer Society Press, Los Alamitos (1997)
4. Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). IETF Network Working Group RFC 2409 (November 1998)
5. Kent, S., Atkinson, R.: IP Authentication Header. IETF Network Working Group RFC 2402 (November 1998)