[1] JEFFREE T, SEAMAN M, ROMANOW A, et al. IEEE standard for local and metropolitan and area networks:Media Access Control (MAC) security:IEEE Std 802.1ae-2006[S].New York:IEEE, 2006. [2] JEFFREE T, CONGDON P, SEAMAN M, et al. IEEE standard for local and metropolitan and area networks:port-based network access control:IEEE Std 802.1x-2010[S].New York:IEEE, 2010. [3] 朱志祥,李琴,黄振海,等. 有线局域网媒体访问控制安全技术要求:YDB 066-2011[S].北京:人民邮电出版社,2011.(ZHU Z X, LI Q, HUANG Z H, et al. Wired local area network medium access control security requirements:YDB 066-2011[S]. Beijing:People Telecom Press, 2011.) [4] 杨宏,张翠,李琴,等. 信息技术系统间远程通信和信息交换局域网和城域网特定要求第3部分:带碰撞检测的载波侦听多址访问(CSMA/CD)的访问方法和物理层规范:GB/T 15629.3-2014[S]. 北京:中国标准出版社,2014.(YANG H, ZHANG C, LI Q, et al. Information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements-part 3:Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method and physical layer specification:GB/T 15629.3-2014[S]. Beijing:Chinese Standard Publishing House, 2014.) [5] LAI X L, HUANG Z H, TIE M X, et al. Information technology-security techniques-entity authentication mechanisms-part 3:entity authentication using a public key algorithm-amendment 1:ISO/IEC 9798-3:1998/Amd 1:2010[S]. Geneva:ISO/IEC, 2010. [6] TCG specification architecture overview specification version 1.4[EB/OL].[2018-04-29]. http://www.trustedcomputinggroup.org/. [7] TCG infrastructure working group reference architecture for interoperability (part I) specification version 1.0[EB/OL].[2018-04-29]. http://www.trustedcomputinggroup.org/. [8] TCG trusted network communications:TNC architecture for interoperability specification version 1.5[EB/OL].[2018-04-29]. http://www.trustedcomputinggroup.org/. [9] 舒晓慧,金小晰,吴瑶. 网络交换机的安全威胁与防范[J].网络安全技术与应用,2014(10):130. (SHU X H, JIN X X, WU Y. Security threats and prevention of a network switch[J]. Network Security Technology & Application, 2014(10):130.) [10] 康双勇. 网络交换机的威胁攻击与安全防范[J].保密科学技术,2017(1):30-33. (KANG S Y. Threat attacks and security prevention of a network switch[J]. Secrecy Science and Technology, 2017(1):30-33.) [11] 侯丽娟. 网络交换机安全加固措施的实现[J].科技传播,2017,9(24):117-118. (HOU L J. Implementation of security reinforcement methods for a network switch[J]. Public Communication of Science & Technology, 2017, 9(24):117-118.) [12] FABREGA F J T, HERZOG J C, GUTTMAN J D. Strand spaces:proving security protocols correct[J]. Journal of Computer Security, 1999, 7(2/3):191-230. [13] HERZOG J C. The Diffie-Hellman key-agreement scheme in the strand space model[C]//Proceedings of the 16th IEEE Computer Security Foundations Workshop. Washington, DC:IEEE Computer Society, 2001:234-247. [14] XIAO Y L, WANG Y M, PANG L J. Verification of trusted network access protocols in the strand space model[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2012, E95-A(3):665-668. [15] TANG Q. On the security of three versions of the WAI protocol in Chinese WLAN implementation plan[C]//Proceedings of the 2nd International Conference on Communications and Networking in China. Piscataway, NJ:IEEE, 2007:333-339. [16] 铁满霞,李建东,王育民. WAPI密钥管理协议的PCL证明[J]. 电子与信息学报,2009,31(2):444-447.(TIE M X, LI J D, WANG Y M. A correctness proof of WAPI key management protocol based on PCL[J]. Journal of Electronics & Information Technology, 2009, 31(2):444-447.) |