메뉴 건너뛰기




Volumn 37, Issue 1, 1998, Pages 42-60

A security architecture for the internet protocol

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER ARCHITECTURE; DATA ACQUISITION; INFORMATION RETRIEVAL; NETWORK PROTOCOLS; STANDARDS; WIDE AREA NETWORKS;

EID: 0031701524     PISSN: 00188670     EISSN: None     Source Type: Journal    
DOI: 10.1147/sj.371.0042     Document Type: Article
Times cited : (22)

References (31)
  • 3
    • 85084163550 scopus 로고
    • Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX
    • June
    • A preliminary version of this paper was presented in Salt Lake City by the authors: P.-C. Cheng, J. A. Garay, A. Herzberg, and H. Krawczyk, "Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX," Proceedings of the 5th USENIX UNIX Security Symposium (June 1995), pp. 41-54.
    • (1995) Proceedings of the 5th USENIX UNIX Security Symposium , pp. 41-54
    • Cheng, P.-C.1    Garay, J.A.2    Herzberg, A.3    Krawczyk, H.4
  • 17
    • 0026973508 scopus 로고
    • Message Authentication with One-Way Hash Functions
    • G. Tsudik, "Message Authentication with One-Way Hash Functions," Proceedings Infocom 92 (1992), pp. 2055-2059.
    • (1992) Proceedings Infocom , vol.92 , pp. 2055-2059
    • Tsudik, G.1
  • 18
    • 35048891868 scopus 로고    scopus 로고
    • Keyed Hash Functions and Message Authentication
    • Advances in Cryptology-Crypto '96, N. Koblitz, Editor, Springer-Verlag
    • M. Bellare, R. Canetti, and H. Krawczyk, "Keyed Hash Functions and Message Authentication,"Advances in Cryptology-Crypto '96, N. Koblitz, Editor, Lecture Notes in Computer Science No. 1109, Springer-Verlag, (1996), pp. 1-15.
    • (1996) Lecture Notes in Computer Science No. 1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 21
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Springer-Verlag, New York August
    • M. Bellare and P. Rogaway, "Entity Authentication and Key Distribution," Advances in Cryptography, Springer-Verlag, New York (August 1993), pp. 232-249.
    • (1993) Advances in Cryptography , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 22
    • 85034462063 scopus 로고    scopus 로고
    • Information on the development of this standard can be found in the IPSEC home page, the IPSEC mailing list ipsec@tis.com
    • Information on the development of this standard can be found in the IPSEC home page, http://www.ietf.org/html.charters/ipsec-charter.html and the IPSEC mailing list ipsec@tis.com.
  • 26
    • 85034471061 scopus 로고    scopus 로고
    • note
    • In other words, in the scenario in the section about the secure tunnel, either A and X or B and Y are not the same.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.