-
1
-
-
1442341306
-
-
IETF, draft-ietf-ipsec-jfk-04.txt, work in progress
-
AIELLO, W., BELLOVIN, S. M., BLAZE M., CANETTI, R., IOANNIDIS, J., KEROMYTIS, A. D., AND REINGOLD, O. 2002. Just Fast Keying (JFK). IETF, draft-ietf-ipsec-jfk-04.txt, work in progress.
-
(2002)
Just Fast Keying (JFK)
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
2
-
-
0036980203
-
Securing IPv6 neighbor discovery and router discovery
-
ACM Press, Atlanta, GA, USA
-
ARKKO, J., AURA, T., KEMPF, J., MANTYLA, V.-M., NIKANDER, P., AND ROE, M. 2002. Securing IPv6 neighbor discovery and router discovery. In Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe). ACM Press, Atlanta, GA, USA, 77-86.
-
(2002)
Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe)
, pp. 77-86
-
-
Arkko, J.1
Aura, T.2
Kempf, J.3
Mantyla, V.-M.4
Nikander, P.5
Roe, M.6
-
4
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
Cambridge, UK, April 2000. Lecture Notes in Computer Science. Springer, Berlin
-
AURA, T., NIKANDER, P., AND LEIWO, J. 2001. DOS-resistant authentication with client puzzles. In Proceedings of the Security Protocols Workshop 2000. Cambridge, UK, April 2000. Lecture Notes in Computer Science, vol. 2133. Springer, Berlin, 170-181.
-
(2001)
Proceedings of the Security Protocols Workshop 2000
, vol.2133
, pp. 170-181
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
6
-
-
3142651499
-
Towards an ipv6-based security framework for distributed storage resources
-
BASSI, A., BECK, M., LAGANIER, J., AND PAOLLINI, G. 2003. Towards an ipv6-based security framework for distributed storage resources. In CMS 2003 Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security.
-
(2003)
CMS 2003 Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security
-
-
Bassi, A.1
Beck, M.2
Laganier, J.3
Paollini, G.4
-
7
-
-
3042683432
-
Message authentication using hash functions - The HMAC construction
-
BELLARE, M., CANETTI, R., AND KRAWCZYK, H. 1996. Message authentication using hash functions - the HMAC construction. RSA CryptoBytes 2, 1.
-
(1996)
RSA CryptoBytes
, vol.2
, Issue.1
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
8
-
-
0004078695
-
-
IETF, RFC2704
-
BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. 1999. The KeyNote Trust-Management System Version 2. IETF, RFC2704.
-
(1999)
The KeyNote Trust-management System Version 2
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
13
-
-
3142544843
-
-
Crypto-ID JXTA. Crypto-id jxta (http://crypto-id.jxta.org/).
-
Crypto-id Jxta
-
-
-
18
-
-
3142580451
-
-
IETF, draft-ietf-mobileip-ipv6-24 (RFC XXX)
-
JOHNSON, D., PERKINS, C., AND ARKKO, J. 2003. Mobile IP for IPv6. IETF, draft-ietf-mobileip-ipv6-24 (RFC XXX).
-
(2003)
Mobile IP for IPv6
-
-
Johnson, D.1
Perkins, C.2
Arkko, J.3
-
19
-
-
3142545818
-
-
JXTA. Project JXTA. Available at www.jxta.org.
-
-
-
-
22
-
-
0003729341
-
-
IETF, RFC2104
-
KRAWCZYK, H., BELLARE, M., AND CANETTI, R. 1997. HMAC: Keyed- Hashing for Message Authentication. IETF, RFC2104.
-
(1997)
HMAC: Keyed-hashing for Message Authentication
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
25
-
-
0037615359
-
-
IETF, draft-ietf-mobileip-mipv6-scrty-reqts-02.txt, work in progress
-
MANKIN, A., PATIL, B., HARKINS, D., NORDMARK, E., NIKANDER, P., ROBERTS, P., AND NARTEN, T. 2001. Threat Models Introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6. IETF, draft-ietf-mobileip-mipv6-scrty- reqts-02.txt, work in progress.
-
(2001)
Threat Models Introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6
-
-
Mankin, A.1
Patil, B.2
Harkins, D.3
Nordmark, E.4
Nikander, P.5
Roberts, P.6
Narten, T.7
-
26
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
MENEZES, A., VAN OORSCHOT, P., AND VANSTONE, S. 1997. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
27
-
-
3042584860
-
Generating RSA keys on a handheld using an untrusted server
-
MODADUGU, N., BONEH, D., AND KIM, M. 2000. Generating RSA keys on a handheld using an untrusted server. In RSA Data Security Conference and Expo, 2000.
-
(2000)
RSA Data Security Conference and Expo, 2000
-
-
Modadugu, N.1
Boneh, D.2
Kim, M.3
-
28
-
-
3142580452
-
-
IETF, draft-montenegro-send-cga-rr-01, work in progress
-
MONTENEGRO, G., LAGANIER, J., AND CASTELLUCCIA, C. 2003. Cryptographically Generated Addresses (CGA). IETF, draft-montenegro-send-cga-rr- 01, work in progress.
-
(2003)
Cryptographically Generated Addresses (CGA)
-
-
Montenegro, G.1
Laganier, J.2
Castelluccia, C.3
-
29
-
-
3142580982
-
-
IETF, draft-moskowitz-hip-impl-01.txt, work in progress
-
MOSKOWITZ, B. 2001. HIP Implementation. IETF, draft-moskowitz-hip-impl- 01.txt, work in progress.
-
(2001)
HIP Implementation
-
-
Moskowitz, B.1
-
30
-
-
3142615977
-
-
IETF, draft-ietf-moskowitz-hip-arch-05.txt, work in progress
-
MOSKOWITZ, B. 2003. HIP Architecture. IETF, draft-ietf-moskowitz-hip- arch-05.txt, work in progress.
-
(2003)
HIP Architecture
-
-
Moskowitz, B.1
-
31
-
-
3142619105
-
-
IETF, draft-moskowitz-hip-09.txt
-
MOSKOWITZ, R., NIKANDER, P., JOKELA, P., AND HENDERSON, T. 2004. Host Identity Protocol. IETF, draft-moskowitz-hip-09.txt.
-
(2004)
Host Identity Protocol
-
-
Moskowitz, R.1
Nikander, P.2
Jokela, P.3
Henderson, T.4
-
33
-
-
3142654849
-
-
IETF, draft-nikander-ipng-address-ownership-00.txt, work in progress
-
NIKANDER, P. 2001. An Address Ownership Problem in IPv6. IETF, draft-nikander-ipng-address-ownership-00.txt, work in progress.
-
(2001)
An Address Ownership Problem in IPv6
-
-
Nikander, P.1
-
34
-
-
4143088086
-
Mobile ip version 6 (mipv6) route optimization security design
-
NIKANDER, P., ARKKO, J., AURA, T., AND MONTENEGRO, G. 2003a. Mobile ip version 6 (mipv6) route optimization security design. In IEEE Vehicular Technology Conference.
-
(2003)
IEEE Vehicular Technology Conference
-
-
Nikander, P.1
Arkko, J.2
Aura, T.3
Montenegro, G.4
-
35
-
-
3142617530
-
-
IETF, draft-nikander-mobileip-v6-ro-sec-02.txt, work in progress
-
NIKANDER, P., ARKKO, J., AURA, T., MONTENEGRO, G., AND NORDMARK, E. 2003b. Mobile IP version 6 (MIPv6) Route Optimization Security Design. IETF, draft-nikander-mobileip-v6-ro-sec-02.txt, work in progress.
-
(2003)
Mobile IP Version 6 (MIPv6) Route Optimization Security Design
-
-
Nikander, P.1
Arkko, J.2
Aura, T.3
Montenegro, G.4
Nordmark, E.5
-
40
-
-
0013093839
-
Child-proof authentication for MIPv6 (CAM)
-
Apr.
-
O'SHEA, G. AND ROE, M. 2001. Child-proof Authentication for MIPv6 (CAM). ACM Computer Communications Review 31, 2 (Apr.), 4-8.
-
(2001)
ACM Computer Communications Review
, vol.31
, Issue.2
, pp. 4-8
-
-
O'Shea, G.1
Roe, M.2
-
41
-
-
0003843664
-
-
IETF, draft-perkins-aodv6-02.txt, work in progress
-
PERKINS, C., BELDING-ROYER, E., AND DAS, S. 2002. Ad Hoc On Demand Distance Vector (AODV) Routing for IP version 6. IETF, draft-perkins-aodv6-02. txt, work in progress.
-
(2002)
Ad Hoc on Demand Distance Vector (AODV) Routing for IP Version 6
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
42
-
-
0003843664
-
-
IETF, RFC 3461
-
PERKINS, C., BELDING-ROYER, E., AND DAS, S. 2003. Ad Hoc On Demand Distance Vector (AODV) Routing. IETF, RFC 3461.
-
(2003)
Ad Hoc on Demand Distance Vector (AODV) Routing
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
|