메뉴 건너뛰기




Volumn 4176 LNCS, Issue , 2006, Pages 311-326

A security architecture for protecting LAN interactions

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL SYSTEM ANALYSIS; NETWORK PROTOCOLS; RESOURCE ALLOCATION; SECURITY OF DATA; SERVERS;

EID: 33750249708     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11836810_23     Document Type: Conference Paper
Times cited : (6)

References (16)
  • 2
    • 0003290981 scopus 로고    scopus 로고
    • Dynamic host configuration protocol
    • IETF
    • Droms, R.: Dynamic Host Configuration Protocol. RFC 2131, IETF (1997)
    • (1997) RFC , vol.2131
    • Droms, R.1
  • 3
    • 0012827821 scopus 로고
    • Ethernet address resolution protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware
    • IETF
    • Plummer, D.: Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware. RFC 826, IETF (1982)
    • (1982) RFC , vol.826
    • Plummer, D.1
  • 4
    • 0347308459 scopus 로고    scopus 로고
    • LAN security: Problems and solutions for Ethernet networks
    • Khoussainov, R., Patel, A.: LAN security: problems and solutions for Ethernet networks. Computer Standards & Interfaces (22) (2000) 191-202
    • (2000) Computer Standards & Interfaces , Issue.22 , pp. 191-202
    • Khoussainov, R.1    Patel, A.2
  • 5
    • 33750253218 scopus 로고    scopus 로고
    • Hunleth, F.: Secure Link Layer (2001) http://www.hunleth.com/fhunleth/ proj ects/sll/sll_report.pdf.
    • (2001) Secure Link Layer
    • Hunleth, F.1
  • 7
    • 0037437630 scopus 로고    scopus 로고
    • A secure address resolution protocol
    • Gouda, M.G., Huang, C.: A Secure Address Resolution Protocol. Computer Networks 41 (1) (2003)
    • (2003) Computer Networks , vol.41 , Issue.1
    • Gouda, M.G.1    Huang, C.2
  • 9
    • 84884546992 scopus 로고    scopus 로고
    • SAFE layer 2 security in-depth version 2
    • Dubrawsky, I.: SAFE Layer 2 Security In-depth Version 2. White Paper (2004) http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/sfblu_wp.pdf.
    • (2004) White Paper
    • Dubrawsky, I.1
  • 10
    • 0003351857 scopus 로고
    • Routing information protocol
    • IETF
    • Hedrick, C.: Routing Information Protocol. RFC 1058, IETF (1988)
    • (1988) RFC , vol.1058
    • Hedrick, C.1
  • 11
    • 0003232377 scopus 로고
    • Internet control message protocol
    • IETF
    • Postel, J.: Internet Control Message Protocol. RFC 792, IETF (1981)
    • (1981) RFC , vol.792
    • Postel, J.1
  • 12
    • 0012784236 scopus 로고    scopus 로고
    • IP security document roadmap
    • IETF
    • Thayer, R., Doraswamy, N., Glenn, R.: IP Security Document Roadmap. RFC 2411, IETF (1998)
    • (1998) RFC , vol.2411
    • Thayer, R.1    Doraswamy, N.2    Glenn, R.3
  • 13
    • 0003272021 scopus 로고    scopus 로고
    • The internet key exchange (IKE)
    • IETF
    • Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). RFC 2409, IETF (1998)
    • (1998) RFC , vol.2409
    • Harkins, D.1    Carrel, D.2
  • 14
    • 0003237987 scopus 로고
    • The kerberos network authentication service (V5)
    • Kohl, J., Neuman, C.: The Kerberos Network Authentication Service (V5). RFC 1510 (1993)
    • (1993) RFC , vol.1510
    • Kohl, J.1    Neuman, C.2
  • 16
    • 0037984627 scopus 로고    scopus 로고
    • Authentication for DHCP messages
    • Droms, R., Arbaugh, W., Eds.: IETF
    • Droms, R., Arbaugh, W., Eds.: Authentication for DHCP Messages. RFC 3118, IETF (2001)
    • (2001) RFC , vol.3118


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.