S. Kent and K. Seo, Security Architecture for the Internet Protocol, RFC, vol.4301, 2005.

S. Pikeos-embedded-virtualization and G. Ag, http://www.sysgo.com/products/pikeos- rtos-and-virtualization/embedded-virtualization, 2011.

T. Ylonen and C. Lonvick, The Secure Shell (SSH) Protocol Architecture, RFC, vol.4251, 2006.
DOI : 10.17487/rfc4251

D. Harkins and D. Carrel, The Internet Key Exchange (IKE) RFC 2409 (Proposed Standard), p.4109, 1998.

S. Kent and A. Ip-encapsulating-security-payload-toom, The MathWorks Inc., http://www.mathworks.com/products/stateflow Gene-Auto: an Automatic Code Generator for a safe subset of Simulink/Stateflow and Scicos Gene-Auto: Automatic Software Code Generation for Real-Time Embedded Systems, Data Systems in Aerospace (DASIA) 2008 [16] Specification for the Advanced Encryption Standard (AES) Federal Information Processing Standards Publication 197 (FIPS-197, National Institute of Standards and Technology (NIST) [17] Secure Hash Standard (SHS) Federal Information Processing Standards Publication National Institude of Standards and Technology (NIST), pp.180-182, 2001.

H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication The BuildWith Technology Usage Statistics Web and Internet Technology Usage Statistics, IETF, p.5, 1997.

L. Hathaway, National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information, pp.2011-2013, 2003.

D. Eastlake and T. Hansen, US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF), RfC, vol.6234, 2011.
DOI : 10.17487/rfc6234

I. Rhee and L. Xu, CUBIC: A New TCP-Friendly High-Speed TCP Variant, ACM SIGOPS Operating Systems Review -Research and developments in the Linux kernel, pp.64-74, 2008.