Bibliography
Aboba, B., Blunk, L. J., Vollbrecht, J. R., Carlson, J., and Levkowetz, H. 2004. “Extensible Authentication Protocol (EAP),” RFC 3748 (June).
Aboba, B. and Dixon, W. 2004. “IPsec-NAT Compatibility Requirements,” RFC 3715 (Mar.).
Agarwal, P. and Akyol, B. 2003. “Time to Live (TTL) Processing in Multi-Protocol Label Switching (MPLS),” RFC 3443 (Jan.).
Alvestrand, H. T. 2001. “Tags for the Identification of Languages,” RFC 3066 (Jan.).
Anderson, R. 1993. “The Classification of Hash Functions,” Proceedings of the Fourth IMA Conference on Cryptography and Coding, pp. 83–93.
http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/hash.ps.Z
Andersson, L., Doolan, P., Feldman, N., Fredette, A., and Thomas, B. 2001. “LDP Specification,” RFC 3036 (Jan.). ...
Get VPNs Illustrated: Tunnels, VPNs, and IPsec now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.