메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages

Security enhancement in infiniBand architecture

Author keywords

[No Author keywords available]

Indexed keywords

DATA PACKETS; INFINIBAND™ ARCHITECTURE (IBA); INVARIANT CRC (ICRC); SYSTEM AREA NETWORKS (SAN);

EID: 33746298446     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IPDPS.2005.396     Document Type: Conference Paper
Times cited : (14)

References (39)
  • 2
    • 84957068240 scopus 로고    scopus 로고
    • UMAC: Fast and secure message authentication
    • Lecture Notes in Computer Science, Springer-Verlag
    • John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, and Phillip Rogaway, "UMAC: Fast and Secure Message Authentication," Advances in Cryptology - CRYPTO '99. Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, 1999, pp. 216-233.
    • (1999) Advances in Cryptology - CRYPTO '99 , vol.1666 , pp. 216-233
    • Black, J.1    Halevi, S.2    Krawczyk, H.3    Krovetz, T.4    Rogaway, P.5
  • 4
    • 0242456132 scopus 로고    scopus 로고
    • Breaking the barriers: High performance security for highPerformance computing
    • Kay Connelly and Andrew A. Chien, "Breaking the Barriers: High Performance Security for HighPerformance Computing," in New Security Paradigms Workshop '02, 2000.
    • (2000) New Security Paradigms Workshop '02
    • Connelly, K.1    Chien, A.A.2
  • 8
    • 33746275838 scopus 로고    scopus 로고
    • Just how secure are security products?
    • Jun.
    • Geer, D. "Just How secure Are security Products?," Computer, Volume 37, Issue 6, Jun. 2004.
    • (2004) Computer , vol.37 , Issue.6
    • Geer, D.1
  • 10
    • 0003272021 scopus 로고    scopus 로고
    • The Internet Key Exchange (IKE)
    • November
    • D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)", November 1998, RFC 2409.
    • (1998) RFC , vol.2409
    • Harkins, D.1    Carrel, D.2
  • 11
    • 0002493137 scopus 로고    scopus 로고
    • Managing security in high- performance distributed computations
    • Ian Foster, Nicholas Karonis, Carl Kesselman and Steven Tuecke, "Managing Security in High- Performance Distributed Computations," Cluster Computing, Vol 1, issue 1, pages 95-107, 1998.
    • (1998) Cluster Computing , vol.1 , Issue.1 , pp. 95-107
    • Foster, I.1    Karonis, N.2    Kesselman, C.3    Tuecke, S.4
  • 12
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • November
    • S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol," November 1998, RFC 2401.
    • (1998) RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 13
  • 14
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • February
    • H. Krawczyk, M. Bellare, R. Canetti, "HMAC: Keyed-Hashing for Message Authentication," February 1997, RFC 2104.
    • (1997) RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 18
  • 20
    • 84937352160 scopus 로고
    • Cyclic codes for error detection
    • Jan.
    • W. W. Reterson and D.T.Brown, "Cyclic codes for error detection," Proceedings IRE, vol. 49, pp. 228-235, Jan. 1961
    • (1961) Proceedings IRE , vol.49 , pp. 228-235
    • Reterson, W.W.1    Brown, D.T.2
  • 22
    • 0042035476 scopus 로고    scopus 로고
    • Code red II worm
    • Incident Analysis, SecurityFocus, Aug.
    • R. Russell and A. Machie, "Code Red II Worm," Tech. Rep., Incident Analysis, SecurityFocus, Aug. 2001.
    • (2001) Tech. Rep.
    • Russell, R.1    Machie, A.2
  • 24
    • 0041534274 scopus 로고    scopus 로고
    • A snapshot of global internet worm activity
    • Arbor Networks, Nov.
    • D. Song, R. Malan, and R. Stone, "A Snapshot of Global Internet Worm Activity," Tech. Rep., Arbor Networks, Nov.2001.
    • (2001) Tech. Rep.
    • Song, D.1    Malan, R.2    Stone, R.3
  • 25
    • 84898476212 scopus 로고
    • An integrity check value algorithm for stream ciphers
    • Springer-Verlag
    • R. Taylor, "An Integrity Check Value Algorithm for Stream Ciphers," Advances in Cryptology-CRYPTO '93 Proceedings, Springer-Verlag, 1994, pp. 40-48.
    • (1994) Advances in Cryptology-CRYPTO '93 Proceedings , pp. 40-48
    • Taylor, R.1
  • 27
    • 3042617182 scopus 로고    scopus 로고
    • A quantitative study of firewall configuration errors
    • Jun.
    • Avishai Wool, "A Quantitative Study of Firewall Configuration Errors," Computer, Volume 37, Issue 6, Jun. 2004.
    • (2004) Computer , vol.37 , Issue.6
    • Wool, A.1
  • 38
    • 0030149507 scopus 로고    scopus 로고
    • Cacti: An enhanced cache access and cycle time model
    • May
    • S. Wilton, N. Jouppi, "Cacti: An enhanced cache access and cycle time model," IEEE Journal of Solid-State Circuits, vol. 31, no. 5, May 1996. pp. 677-688.
    • (1996) IEEE Journal of Solid-state Circuits , vol.31 , Issue.5 , pp. 677-688
    • Wilton, S.1    Jouppi, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.