메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 108-116

TARP: Ticket-based address resolution protocol

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; INTERNET; SECURITY OF DATA;

EID: 33846297018     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.55     Document Type: Conference Paper
Times cited : (35)

References (39)
  • 1
    • 77955030312 scopus 로고    scopus 로고
    • accessed June 2005
    • Anatomy of an arp poisoning attack. http://www.watchguard.com/infocenter/ editorial/135324.asp, accessed June 2005.
    • Anatomy of an arp poisoning attack
  • 4
    • 33846317656 scopus 로고    scopus 로고
    • C. Adams and R. Zuccherato. A General, Flexible Approach to Certificate Revocation, June 1998. http://www.entrust.com/securityzone/whitepapers.htm.
    • C. Adams and R. Zuccherato. A General, Flexible Approach to Certificate Revocation, June 1998. http://www.entrust.com/securityzone/whitepapers.htm.
  • 8
    • 0002738343 scopus 로고
    • Security problems in the tcp/ip protocol suite
    • April
    • S. M. Bellovin. Security problems in the tcp/ip protocol suite. Computer Communications Review, 2(19):32-48, April 1989.
    • (1989) Computer Communications Review , vol.2 , Issue.19 , pp. 32-48
    • Bellovin, S.M.1
  • 14
    • 33846319919 scopus 로고    scopus 로고
    • access points and arp poisoning: Wireless vulnerabilities that expose the wired network
    • B. Fleck and J. Dimov. Wireless access points and arp poisoning: Wireless vulnerabilities that expose the wired network. http://downloads.securityfocus. com/library/arppoison.pdf.
    • Wireless
    • Fleck, B.1    Dimov, J.2
  • 16
    • 0037437630 scopus 로고    scopus 로고
    • A secure address resolution protocol
    • January
    • M. Gouda, and C. Huang. A secure address resolution protocol. Computer Networks, 41:860-921, January 2003.
    • (2003) Computer Networks , vol.41 , pp. 860-921
    • Gouda, M.1    Huang, C.2
  • 20
    • 84958063551 scopus 로고    scopus 로고
    • P. Kocher. On Certificate Revocation and Validation. In R. Hirschfeld, editor, Financial Cryptography FC '98, 1465, pages 172-177, Anguilla, British West Indies, February 1998. Springer.
    • P. Kocher. On Certificate Revocation and Validation. In R. Hirschfeld, editor, Financial Cryptography FC '98, volume 1465, pages 172-177, Anguilla, British West Indies, February 1998. Springer.
  • 21
    • 33846319235 scopus 로고    scopus 로고
    • L. B. N. L. (LBNL). Arpwatch: Ethernet monitor program. http://www-nrg.ee.lbl.gov, accessed May 2005.
    • L. B. N. L. (LBNL). Arpwatch: Ethernet monitor program. http://www-nrg.ee.lbl.gov, accessed May 2005.
  • 24
    • 0033885757 scopus 로고    scopus 로고
    • Windowed Certificate Revocation
    • IEEE, March, Tel Aviv, Israel
    • P. McDaniel and S. Jamin. Windowed Certificate Revocation. In Proceedings of IEEE INFOCOM 2000, pages 1406-1414. IEEE, March 2000. Tel Aviv, Israel.
    • (2000) Proceedings of IEEE INFOCOM 2000 , pp. 1406-1414
    • McDaniel, P.1    Jamin, S.2
  • 25
    • 0003267027 scopus 로고    scopus 로고
    • A Response to 'Can We Eliminate Certificate Revocation Lists?
    • International Financial Cryptography Association IFCA, February, Anguilla, British West Indies
    • P. McDaniel and A. Rubin. A Response to 'Can We Eliminate Certificate Revocation Lists?'. In Proceedings of Financial Cryptography 2000. International Financial Cryptography Association (IFCA), February 2000. Anguilla, British West Indies.
    • (2000) Proceedings of Financial Cryptography 2000
    • McDaniel, P.1    Rubin, A.2
  • 26
    • 0004179384 scopus 로고    scopus 로고
    • Efficient Certificate Revocation
    • MIT/LCS/TM-542b, Massachusetts Institute of Technology
    • S. Micali. Efficient Certificate Revocation. Technical Report Technical Memo MIT/LCS/TM-542b, Massachusetts Institute of Technology, 1996.
    • (1996) Technical Report Technical Memo
    • Micali, S.1
  • 28
    • 84958056811 scopus 로고    scopus 로고
    • M. Myers. Revocation: Options and Challenges. In R. Hirschfeld, editor, Financial Cryptography FC '98, 1465, pages 165-171, Anguilla, British West Indies, February 1998. Springer.
    • M. Myers. Revocation: Options and Challenges. In R. Hirschfeld, editor, Financial Cryptography FC '98, volume 1465, pages 165-171, Anguilla, British West Indies, February 1998. Springer.
  • 34
    • 33846324226 scopus 로고    scopus 로고
    • R. Rivest and B. Lampson. SDSI A Simple Distributed Security Infrastructure, October 1996. http://theory.lcs.mit.edu/~rivest/sdsi11.html.
    • R. Rivest and B. Lampson. SDSI A Simple Distributed Security Infrastructure, October 1996. http://theory.lcs.mit.edu/~rivest/sdsi11.html.
  • 35
    • 84861242278 scopus 로고    scopus 로고
    • packet construction library
    • M. Schiffman. The libnet packet construction library. http://www.packetfactory.net/libnet/.
    • The libnet
    • Schiffman, M.1
  • 37
    • 33846316960 scopus 로고    scopus 로고
    • D. Song, dsniff: a collection of tools for network auditing and penetration testing, http://www.monkey.org/dugsong/dsniff, accessed May 2005.
    • D. Song, dsniff: a collection of tools for network auditing and penetration testing, http://www.monkey.org/dugsong/dsniff, accessed May 2005.
  • 39
    • 85084164692 scopus 로고    scopus 로고
    • SSH - Secure Login Connections Over the Internet
    • USENIX Association, June, San Jose, CA
    • T. Ylonen. SSH - Secure Login Connections Over the Internet. In Proceedings of 6th USENIX UNIX Security Symposium, pages 37-42. USENIX Association, June 1996. San Jose, CA.
    • (1996) Proceedings of 6th USENIX UNIX Security Symposium , pp. 37-42
    • Ylonen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.