-
3
-
-
85084163550
-
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX
-
June
-
A preliminary version of this paper was presented in Salt Lake City by the authors: P.-C. Cheng, J. A. Garay, A. Herzberg, and H. Krawczyk, "Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX," Proceedings of the 5th USENIX UNIX Security Symposium (June 1995), pp. 41-54.
-
(1995)
Proceedings of the 5th USENIX UNIX Security Symposium
, pp. 41-54
-
-
Cheng, P.-C.1
Garay, J.A.2
Herzberg, A.3
Krawczyk, H.4
-
12
-
-
0003437009
-
-
Addison-Wesley Publishing Co., Reading, MA
-
W. R. Cheswick and S. M. Bellovin, Firewalls and Internet Security, Repelling the Wily Hacker, Addison-Wesley Publishing Co., Reading, MA (1994).
-
(1994)
Firewalls and Internet Security, Repelling the Wily Hacker
-
-
Cheswick, W.R.1
Bellovin, S.M.2
-
15
-
-
1542593353
-
Authentication and Authenticated Key Exchanges
-
W. Diffie, P. van Oorschot, and M. Wiener, "Authentication and Authenticated Key Exchanges," Designs, Codes and Cryptography 2, 107-125 (1992).
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
17
-
-
0026973508
-
Message Authentication with One-Way Hash Functions
-
G. Tsudik, "Message Authentication with One-Way Hash Functions," Proceedings Infocom 92 (1992), pp. 2055-2059.
-
(1992)
Proceedings Infocom
, vol.92
, pp. 2055-2059
-
-
Tsudik, G.1
-
18
-
-
35048891868
-
Keyed Hash Functions and Message Authentication
-
Advances in Cryptology-Crypto '96, N. Koblitz, Editor, Springer-Verlag
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keyed Hash Functions and Message Authentication,"Advances in Cryptology-Crypto '96, N. Koblitz, Editor, Lecture Notes in Computer Science No. 1109, Springer-Verlag, (1996), pp. 1-15.
-
(1996)
Lecture Notes in Computer Science No. 1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
19
-
-
0022793132
-
How to Construct Random functions
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random functions "Journal of the ACM 33, No. 4,210-217 (1986).
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
20
-
-
0027617333
-
Systematic Design of a Family of Attack-Resistant Authentication Protocols
-
June
-
R. Bird, I. Gopal, A. Herzberg, P. A. Janson, S. Kutten, R. Molva, and M. Yung, "Systematic Design of a Family of Attack-Resistant Authentication Protocols," IEEE Journal on Selected Areas in Communications 11, No. 5,679-693 (June 1993).
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.A.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
21
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Springer-Verlag, New York August
-
M. Bellare and P. Rogaway, "Entity Authentication and Key Distribution," Advances in Cryptography, Springer-Verlag, New York (August 1993), pp. 232-249.
-
(1993)
Advances in Cryptography
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
22
-
-
85034462063
-
-
Information on the development of this standard can be found in the IPSEC home page, the IPSEC mailing list ipsec@tis.com
-
Information on the development of this standard can be found in the IPSEC home page, http://www.ietf.org/html.charters/ipsec-charter.html and the IPSEC mailing list ipsec@tis.com.
-
-
-
-
26
-
-
85034471061
-
-
note
-
In other words, in the scenario in the section about the secure tunnel, either A and X or B and Y are not the same.
-
-
-
-
28
-
-
0029250361
-
The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution
-
February
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, "The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution," IEEE/ACM Transactions on Networking 3, No. 1,31-41 (February 1995).
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.1
, pp. 31-41
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
30
-
-
3142582037
-
Networking Implementation Notes, 4.3BSD Edition
-
USENIX Association April
-
S. J. Leffler, W. N. Joy, R. S. Farby, and M. J. Karel, "Networking Implementation Notes, 4.3BSD Edition," UNIX System Manager's Manual, 4.3 Berkeley Software Distribution, Virtual VAX-11 Edition, USENIX Association (April 1986).
-
(1986)
UNIX System Manager's Manual, 4.3 Berkeley Software Distribution, Virtual VAX-11 Edition
-
-
Leffler, S.J.1
Joy, W.N.2
Farby, R.S.3
Karel, M.J.4
|