[ 1] Gong Jian, Lu Sheng , Wang Qian. Computer Networ k Security Co nspectus[ M] . First Edition. Published by Southeast Univ ersity, Nanjing: Song Zengmin, 2002, 1~ 290.
[ 2] Douglas E Comer , David L Stevens. Internetworking w ith TCPPIP Vol.Ⅲ : Client-Server Programming and Applications[M] . Second Edition, Prentice Hall Inc, 1998, 1~ 403.
[ 3] Charlie Kaufman, Radia Perlman, Mike Speciner. Netwo rk Security : Pr ivate Communication in a Public Wo rld[M] . First Edition. Prentice Hall Inc, 1995, 1~ 205.
[ 4] Liu Jianhang. The PKI based CA[ Degree dissertation] [ D] . Preserved in Nanjing: Southeast University . 1999.
[ 5] J Callas. OpenPGP Message Format[ DBPOL] . http:PPw ww. ietf. org , 1998P2002.
[ 6] B Feinstein. The Intrusion Detection Exchange Protocol ( IDXP) [ DBPOL] . http:PPwww . ietf. o rg, 2002P2002.