10. Referências
  1. C. Adams, S. Lloyd. Understanding public-key infrastructure: concepts, standards, and deployment considerations. Addison-Wesley, Segunda Edição, Janeiro de 2003.

  2. C. Kaufman. Internet Key Exchange (IKEv2) Protocol. RFC 4306, Dezembro de 2005.

  3. C. Kozierok. The TCP/IP guide: a comprehensive, illustrated Internet protocols reference. No Starch Press, p. 449-473, 2005.

  4. J. Touch, L. Eggert, Y. Wang. Use of Ipsec Transport Mode for Dynamic Routing. RFC 3884, Setembro de 2004.

  5. K. Paterson, A. Yau. Cryptography in Theory and Practice: The Case of Encryption in IPsec. Cryptology ePrint Archive, Report 2005/416, 2005.

  6. N. Ferguson, B. Schneier. A Cryptographic Evaluation of IPsec. Counterpane Internet Security, Dezembro de 2003.

  7. R. Oppliger. Security at the Internet Layer. IEEE, Setembro de 1998.

  8. S. Kent, K, Seo. Security Architecture for the Internet Protocol. RFC 4301, Dezembro de 2005.

  9. S. Kent. IP Authentication Header. RFC 4302, Dezembro de 2005.

  10. S. Kent. IP Encapsulating Security Payload (ESP). RFC 4303, Dezembro de 2005.

  11. W. Diffie, M. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, vol. IT-22, Novembro de 1976.

  12. W. Stallings. IP Security. The Internet Protocol Journal, Volume 3, no. 1, Março de 2000.