메뉴 건너뛰기




Volumn 3193, Issue , 2004, Pages 309-321

Hindering eavesdropping via IPv6 opportunistic encryption

Author keywords

CBID; Delegation; IKE; IPsec; IPv6; Opportunistic Encryption; Security

Indexed keywords

CRYPTO-BASED IDENTIFIER; DELEGATION; DYNAMIC CONFIGURATION; ENCRYPTED TUNNELS; ENCRYPTION SCHEMES; IKE; IPSEC; IPV6; OPPORTUNISTIC ENCRYPTION; SECURITY;

EID: 19944409146     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30108-0_19     Document Type: Article
Times cited : (5)

References (21)
  • 1
    • 35048825532 scopus 로고    scopus 로고
    • The Bridge, National Academy of Engineering.
    • Bellovin Steve, "Wiretapping the net," The Bridge, National Academy of Engineering., 2000.
    • (2000) Wiretapping the Net
    • Steve, B.1
  • 7
  • 8
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public key infrastructure
    • C. Ellison and B. Schneier, "Ten risks of PKI: What you're not being told about public key infrastructure," Computer Security Journal, vol. 16, no. 1, pp. 1-7, 2000.
    • (2000) Computer Security Journal , vol.16 , Issue.1 , pp. 1-7
    • Ellison, C.1    Schneier, B.2
  • 12
    • 35248872561 scopus 로고    scopus 로고
    • Cryptographically generated addresses (CGA)
    • 6th Information Security Conference ISC'03, Bristol, UK, October
    • Tuomas Aura, "Cryptographically generated addresses (CGA)," in 6th Information Security Conference (ISC'03, Bristol, UK, October 2003, vol. 2851, pp. 29-43, LNCS.
    • (2003) LNCS , vol.2851 , pp. 29-43
    • Aura, T.1
  • 18
    • 4944256021 scopus 로고    scopus 로고
    • SIGMA: The SIG-and-MAc approach to authenticated diffiehellman and its use in the ike protocols
    • Santa Barbara, August
    • Hugo Krawczyk, "SIGMA: The SIG-and-MAc approach to authenticated diffiehellman and its use in the ike protocols," in CRYPTO, Santa Barbara, August 2003.
    • (2003) CRYPTO
    • Krawczyk, H.1
  • 19
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols anf their use for building secure channels
    • R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols anf their use for building secure channels," in Eurocrypt, 2001, vol. 2045.
    • (2001) Eurocrypt , vol.2045
    • Canetti, R.1    Krawczyk, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.