-
2
-
-
85084160050
-
Problem areas for the IP security protocols
-
July 1996. Also at ftp://ftp.research.att.com/dist/smb/badesp.ps
-
Bellovin S (1996) Problem areas for the IP security protocols. In: Proceedings of the 6th USENIX UNIX security symposium, July 1996. Also at ftp://ftp.research.att.com/dist/smb/badesp.ps
-
(1996)
Proceedings of the 6th USENIX UNIX Security Symposium
-
-
Bellovin, S.1
-
4
-
-
0022769976
-
Graph-based algorithms for boolean function manipulation
-
Bryant RE (1986) Graph-based algorithms for boolean function manipulation. IEEE Trans Comput C-35(8):677-691
-
(1986)
IEEE Trans. Comput. C
, vol.35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
5
-
-
14844312690
-
-
Cisco Systems 10th edn. Chapters 10 to 17 (especially Chapter 16). For more recent information, see
-
Cisco Systems (1994) Router Products Command Reference, 10th edn. Chapters 10 to 17 (especially Chapter 16). For more recent information, see http://www.cisco.com/univercd/
-
(1994)
Router Products Command Reference
-
-
-
6
-
-
0005240447
-
A cryptographic evaluation of ipsec
-
Counterpane Internet Security, Inc
-
Ferguson N, Schneier B (1999) A cryptographic evaluation of ipsec. Counterpane Internet Security, Inc.http://www.counterpane.com/ipsec.html
-
(1999)
-
-
Ferguson, N.1
Schneier, B.2
-
8
-
-
18444377006
-
Security goals: Packet trajectories and strand spaces
-
Gorrieri R, Focardi R (eds), Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Guttman JD (2001) Security goals: Packet trajectories and strand spaces. In: Gorrieri R, Focardi R (eds) Foundations of security analysis and design. Lecture notes in computer science, vol 2171. Springer, Berlin Heidelberg New York, pp 197-261
-
(2001)
Foundations of Security Analysis and Design
, vol.2171
, pp. 197-261
-
-
Guttman, J.D.1
-
10
-
-
84944030742
-
Authentication and confidentiality via IPsec
-
Gollman D (ed), Lecture notes in computer science Springer, Berlin Heidelberg New York
-
Guttman JD, Herzog AL, Thayer FJ (2000) Authentication and confidentiality via IPsec. In: Gollman D (ed) ESORICS 2000: European symposium on research in computer security. Lecture notes in computer science, vol 1895. Springer, Berlin Heidelberg New York
-
(2000)
ESORICS 2000: European Symposium on Research in Computer Security
, vol.1895
-
-
Guttman, J.D.1
Herzog, A.L.2
Thayer, F.J.3
-
12
-
-
0004006818
-
IP authentication header
-
IETF Network Working Group RFC 2402, November 1998
-
Kent S, Atkinson R (1998) IP authentication header. IETF Network Working Group RFC 2402, November 1998
-
(1998)
-
-
Kent, S.1
Atkinson, R.2
-
13
-
-
0004044627
-
IP encapsulating security payload
-
IETF Network Working Group RFC 2406, November 1998
-
Kent S, Atkinson R (1998) IP encapsulating security payload. IETF Network Working Group RFC 2406, November 1998
-
(1998)
-
-
Kent, S.1
Atkinson, R.2
-
14
-
-
0003470642
-
Security Architecture for the Internet protocol
-
IETF Network Working Group RFC 2401, November 1998
-
Kent S, Atkinson R (1998) Security Architecture for the Internet protocol. IETF Network Working Group RFC 2401, November 1998
-
(1998)
-
-
Kent, S.1
Atkinson, R.2
-
15
-
-
0004148156
-
-
INRIA
-
Leroy X, Doligez D, Garrigue J, Rémy D, Vouillon J (2000) The Objective Caml system,version 3.00. INRIA, http://caml.inria.fr/.
-
(2000)
The Objective Caml System,Version 3.00
-
-
Leroy, X.1
Doligez, D.2
Garrigue, J.3
Rémy, D.4
Vouillon, J.5
-
18
-
-
14844321177
-
-
Internet Security Association and Key Management Protocol (ISAKMP), IETF Network Working Group RFC 2408, November 1998
-
Maughan D, Schertler M, Schneider M, Turner J (1998) Internet Security Association and Key Management Protocol (ISAKMP). IETF Network Working Group RFC 2408, November 1998
-
(1998)
-
-
Maughan, D.1
Schertler, M.2
Schneider, M.3
Turner, J.4
-
19
-
-
0033691924
-
Fang: A firewall analysis engine
-
May 2000. IEEE Press, New York
-
Mayer A, Wool A, Ziskind E (2000) Fang: A firewall analysis engine. In: Proceedings of the IEEE symposium on security and privacy, May 2000. IEEE Press, New York, pp 177-187
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 177-187
-
-
Mayer, A.1
Wool, A.2
Ziskind, E.3
-
20
-
-
14844306631
-
Ip filter
-
Download Web Page, December
-
Reed D (2002) Ip filter. Download Web Page, December. URL http://coombs.anu.edu.au/avalon/
-
(2002)
-
-
Reed, D.1
-
21
-
-
84861250584
-
Linux ip firewalling chains
-
Linux Howto, October 2000
-
Russell R (2000) Linux ip firewalling chains. Linux Howto, October 2000. URL http://www.netfilter.org/ipchains/
-
(2000)
-
-
Russell, R.1
|