论文部分内容阅读
研究了IKE第一阶段两种模式下的多种认证方案,比较了各种认证方案的安全性差异。探讨了不同应用下的认证方案的选择问题。
I studied a variety of authentication schemes in the first phase of IKE, and compared the security differences of various authentication schemes. Discusses the selection of authentication schemes under different applications.