Bibliography

1. Aboba, B., and D. Simon, ‘PPP EAP TLS Authentication Protocol’, RFC 2716, October 1999.

2. Abrams, M., and H. Podell, Computer and Network Security. Los Alamitos, CA: IEEE Computer Society Press, 1987.

3. Adams, C., and S. Farrell, ‘Internet X.509 Public Key Infrastructure Certificate Management Protocols’, Internet Draft, December 2001.

4. Almquist, P., ‘Type of Service in the Internet Protocol Suite’, RFC 1349, July 1992.

5. Astély, D., E. Dahlman, A. Furuskär, Y. Jading, M. Lindström and S. Parkvall, ‘LTE: The Evolution of Mobile Broadband’, Communications Magazine, April 2009.

6. Atkinson, R., ‘Security Architecture for the Internet Protocol’, RFC 1825, August 1995.

7. Atkinson, R., ‘IP Authentication Header’, RFC 1826, August 1995.

8. Atkinson, R., ‘IP Encapsulation Security Payload (ESP)’, RFC 1827, August 1995.

9. Ballardie, A., ‘Core Based Trees (CBT) Multicast Routing Architecture’, RFC 2201, September 1997.

10. Bellovin, S., ‘Firewall-Friendly FTP’, RFC 1579, February 1994.

11. Bellovin, S., and W. Cheswick, ‘Network Firewalls’, IEEE Communications Magazine, September 1994.

12. Berners-Lee, T., and D. Connolly, ‘Hypertext Markup Language—2.0’, RFC 1866, November 1995.

13. Berners-Lee, T., R. Fielding and H. Nielsen, ‘Hypertext Transfer Protocol—HTTP/ 1.0’, RFC 1945, May 1996.

14. Blakley, B., ‘Architecture for Public-Key Infrastructure’, Internet Draft, November 1996.

15. Boeyen, S., R. Housley, T. Howes, M. Myers and P. Richard, ‘Internet Public Key Infrastructure ...

Get Wireless Mobile Internet Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.