Computer Science ›› 2014, Vol. 41 ›› Issue (8): 192-196.doi: 10.11896/j.issn.1002-137X.2014.08.042
Previous Articles Next Articles
WU Yang,MA Yun-fei,WANG Tao and XING Meng
[1] 陈亮,龚俭,徐选.应用层协议识别算法综述[J].计算机科学,2007,4(7):73-75 [2] 吴志军,阚洪涛.基于ECC的TES网络链路层安全协议的研究[J].通信学报,2009,30(11):86-92 [3] 张杨.基于NDIS的数据链路层加密[J].辽宁大学学报,2010,37(2):116-118 [4] DOD(Department of Defense).MIL-STD-188-220C[EB/OL].http://www.everyspec.com,2012-06-29 [5] Charles V W,Fabian M,Gerald M M.On inferring application protocol behaviors in encrypted network traffic[J].Journal of Machine Learning Research,2006,7(12):2745-2769 [6] Sun Guang-lu,Xue Yi-bo,Dong Ying-fei,et al.A Novel Hybrid Method for Effectively Classifying Encrypted Traffic[C]∥Proceedings of Communications and Systems Security,2010(GLOBECOM 2010) .Miami USA:IEEE,2010:1-5 [7] 赵博,郭虹,刘勤让,等.基于加权累积和检验的加密流量盲识别算法[J].软件学报,2013,24(6):1334-1345 [8] Menezes Alfred J,van Oorschot P C,Vanstone S A.应用密码学手册[M].胡磊,王鹏,等译.北京:电子工业出版社,2005 [9] 胡俭勇,苏锦海.一种随机性实时检测方案[J].计算机工程,2009,34(9):136-138 [10] Rukhin A,Soto J,Nechvatal J.A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications[R].Technical Report.SP 2001:800-22 [11] Filiol E.A new statistical testing for symmetric ciphers and hash functions[C]∥Information and Communications Security:4th International Conference.Berlin:Springer,2002:342-353 [12] NIST FIPS PUB 140-2-2001.Security Requirements for Cryptographic Modules[S].Washington DC,USA:National Institute of Standards and Technology,http://csrc.nist.gov,2001 [13] NIST SP800-22.A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications Revision 1a[S].Washington DC,USA:National Institute of Standards and Technology,http://csrc.nist.gov,2010 |
No related articles found! |
|