메뉴 건너뛰기




Volumn 6, Issue 1, 2001, Pages 35-48

IPsec networking standards - An overview

Author keywords

[No Author keywords available]

Indexed keywords


EID: 21844453937     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1363-4127(01)00106-6     Document Type: Note
Times cited : (7)

References (21)
  • 1
    • 85031465904 scopus 로고    scopus 로고
    • are published by, and copyright of, the Internet Society. where XXXX is the number of the RFC
    • All RFC (Request for Comment) documents are published by, and copyright of, the Internet Society. All are available online at http://www.ietf.org/rfc/rfcXXXX.txt, where XXXX is the number of the RFC.
    • All RFC (Request for Comment) Documents
  • 2
    • 85031472032 scopus 로고    scopus 로고
    • A cryptographic evaluation of IPsec
    • [FeS99]
    • [FeS99]N. Ferguson and B. Schneier, A Cryptographic Evaluation of IPsec, published by Counterpane Systems. Available online at: http://www.counterpane.com/pubs/ipsec.html.
    • Counterpane Systems
    • Ferguson, N.1    Schneier, B.2
  • 3
    • 0003629991 scopus 로고
    • [FIPS-180-1]NIST, FIPS PUB 180-1: April
    • [FIPS-180-1]NIST, FIPS PUB 180-1: Secure Hash Standard, April 1995. Available online at http://csrc.nist.gov/fips/fipl80-l.txt.
    • (1995) Secure Hash Standard
  • 4
    • 0343315778 scopus 로고    scopus 로고
    • The NULL encryption algorithm and its use with IPsec
    • [G1K98]
    • [G1K98]R. Glenn and S.Kent, The NULL Encryption Algorithm and Its Use With IPsec, published as RFC 2410.
    • RFC , vol.2410
    • Glenn, R.1    Kent, S.2
  • 5
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • [KA98]
    • [KA98]S. Kent and R. Atkinson, Security Architecture for the Internet Protocol, published as RFC 2401.
    • RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 6
    • 0003254362 scopus 로고    scopus 로고
    • IP authentication header
    • [KA98b]
    • [KA98b]S. Kent and R. Atkinson, IP Authentication Header, published as RFC 2402.
    • RFC , vol.2402
    • Kent, S.1    Atkinson, R.2
  • 7
    • 0003315822 scopus 로고    scopus 로고
    • IP encapsulating security payload
    • [KA98c]
    • [KA98c]S. Kent and R. Atkinson, IP Encapsulating Security Payload, published as RFC 2406.
    • RFC , vol.2406
    • Kent, S.1    Atkinson, R.2
  • 8
    • 0004601832 scopus 로고    scopus 로고
    • Photuris: Session-key management protocol
    • [KaS99]
    • [KaS99]P. Karn and W. Simpson, Photuris: Session-Key Management Protocol, published as RFC 2522.
    • RFC , vol.2522
    • Karn, P.1    Simpson, W.2
  • 9
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • [KBC97]
    • [KBC97]H. Krawczyk, M. Bellare and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, published as RFC 2104.
    • RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 10
    • 85031469480 scopus 로고    scopus 로고
    • Security options for the internet protocol
    • [Ke91]
    • [Ke91]S.Kent, Security Options for the Internet Protocol, published as RFC 1108.
    • RFC , vol.1108
    • Kent, S.1
  • 11
    • 35048837353 scopus 로고    scopus 로고
    • The use of HMAC-RIPEMD-160-96 within ESP and AH
    • [KePOO]
    • [KePOO]A. Keromytis and N. Provos, The Use of HMAC-RIPEMD-160-96 within ESP and AH, published as RFC 2857.
    • RFC , vol.2857
    • Keromytis, A.1    Provos, N.2
  • 12
    • 0009547332 scopus 로고    scopus 로고
    • The ESP DES-CBC cipher algorithm with explicit IV
    • [MaD98]
    • [MaD98]C. Madson and N. Doraswamy, The ESP DES-CBC Cipher Algorithm With Explicit IV, published as RFC 2405.
    • RFC , vol.2405
    • Madson, C.1    Doraswamy, N.2
  • 13
    • 0003338167 scopus 로고    scopus 로고
    • The use of HMAC-MD5-96 within ESP and AH
    • [MaG98]
    • [MaG98]C. Madson and R.Glenn, The Use of HMAC-MD5-96 within ESP and AH, published as RFC 2403.
    • RFC , vol.2403
    • Madson, C.1    Glenn, R.2
  • 14
    • 0005695534 scopus 로고    scopus 로고
    • The use of HMAC-SHA-1-96 within ESP and AH
    • [MaG98b]
    • [MaG98b]C. Madson and R. Glenn, The Use of HMAC-SHA-1-96 within ESP and AH, published as RFC 2404.
    • RFC , vol.2404
    • Madson, C.1    Glenn, R.2
  • 15
    • 0003357112 scopus 로고    scopus 로고
    • Internet security association and key management protocol (ISAKMP)
    • [MSST98]
    • [MSST98]D. Maughan, M. Schertier, M. Schneider and J. Turner, Internet Security Association and Key Management Protocol (ISAKMP), published as RFC 2408.
    • RFC , vol.2408
    • Maughan, D.1    Schertier, M.2    Schneider, M.3    Turner, J.4
  • 17
    • 0003294637 scopus 로고    scopus 로고
    • The OAKLEY key determination protocol
    • [Orm99]
    • [Orm99]H. Orman, The OAKLEY Key Determination Protocol, published as RFC 2412.
    • RFC , vol.2412
    • Orman, H.1
  • 18
    • 4444351714 scopus 로고    scopus 로고
    • The ESP CBC-mode cipher algorithms
    • [PeA98]
    • [PeA98]R. Pereira and R. Adams, The ESP CBC-Mode Cipher Algorithms, published as RFC 2451.
    • RFC , vol.2451
    • Pereira, R.1    Adams, R.2
  • 19
    • 0003385051 scopus 로고    scopus 로고
    • The internet IP security domain of interpretation for ISAKMP
    • [Pip98]
    • [Pip98]D. Piper, The Internet IP Security Domain of Interpretation for ISAKMP, published as RFC 2407.
    • RFC , vol.2407
    • Piper, D.1
  • 20
    • 0003195066 scopus 로고    scopus 로고
    • The MD5 message digest algorithm
    • [Ri92]
    • [Ri92]R. Rivest, The MD5 Message Digest Algorithm, published as RFC 1321.
    • RFC , vol.1321
    • Rivest, R.1
  • 21
    • 0005974305 scopus 로고    scopus 로고
    • [Sim99] published in ;login:, by Usenix, December
    • [Sim99]W. Simpson, IKE/ISAKMP Considered Harmful, published in ;login:, by Usenix, December 1999. Available online at http://www.usenix.org/publications/login/ 1999-12/features/harmful.html.
    • (1999) IKE/ISAKMP Considered Harmful
    • Simpson, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.