메뉴 건너뛰기




Volumn , Issue , 2007, Pages 607-614

An architectural framework for data link layer security with security inter-layering

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; ETHERNET; INTERNET PROTOCOLS; MEDIUM ACCESS CONTROL; OPTICAL LINKS;

EID: 34547663065     PISSN: 10910050     EISSN: 1558058X     Source Type: Conference Proceeding    
DOI: 10.1109/SECON.2007.342975     Document Type: Conference Paper
Times cited : (7)

References (27)
  • 2
    • 84858090248 scopus 로고    scopus 로고
    • IEEE 802.1AE-Media Access Control (MAC) Security
    • July, Online, Available
    • "IEEE 802.1AE-Media Access Control (MAC) Security," July 2006, [Online]. Available: http://www.ieee802.org/1/pages/802.1.ae.html.
    • (2006)
  • 3
    • 84892214814 scopus 로고    scopus 로고
    • Layer 2 - The weakest link: Security considerations at the Data Link Layer
    • First Quarter
    • C. Howard, "Layer 2 - The weakest link: Security considerations at the Data Link Layer," PACKET, vol. 15, no. 1, First Quarter 2003.
    • (2003) PACKET , vol.15 , Issue.1
    • Howard, C.1
  • 4
    • 85191940361 scopus 로고    scopus 로고
    • H. Altunbasak, S. Krasser, H. L. Owen, J. Grimminger, H.-P. Huth, and J. Sokol, Securing Layer 2 in Local Area Networks, in ICN, 2, Reunion, France, April 2005, pp. 699-706.
    • H. Altunbasak, S. Krasser, H. L. Owen, J. Grimminger, H.-P. Huth, and J. Sokol, "Securing Layer 2 in Local Area Networks," in ICN, vol. 2, Reunion, France, April 2005, pp. 699-706.
  • 7
    • 0142099692 scopus 로고    scopus 로고
    • November, Special Publication 800-48, Recommendations of the National Institute of Standards and Technology, Online, Available
    • T. Karygiannis and L. Owens, Wireless Network Security 802.11, Bluetooth and Handheld Devices, November 2002, Special Publication 800-48, Recommendations of the National Institute of Standards and Technology. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-48/NIST SP 800-48.pdf.
    • (2002) Wireless Network Security 802.11, Bluetooth and Handheld Devices
    • Karygiannis, T.1    Owens, L.2
  • 9
    • 0004006818 scopus 로고    scopus 로고
    • Nov, RFC 2402, Online, Available
    • S. Kent and R. Atkinson, IP Authentication Header, Nov. 1998, RFC 2402. [Online]. Available: http://www.ietf.org/rfc/rfc2402.txt.
    • (1998) IP Authentication Header
    • Kent, S.1    Atkinson, R.2
  • 11
    • 33746653289 scopus 로고    scopus 로고
    • NISCC vulnerability advisory IPSEC - 004033
    • May, Online, Available
    • "NISCC vulnerability advisory IPSEC - 004033," May 2005, [Online]. Available: http://www.niscc.gov.uk/niscc/docs/al-20050509-00386. html?lang=en.
    • (2005)
  • 13
    • 33846315829 scopus 로고    scopus 로고
    • RSA/SHA-1 SIGs and RSA KEYs in the Domain Name system (dns)
    • IETF RFC 3110, May, Online, Available
    • Donald E. Eastlake, "RSA/SHA-1 SIGs and RSA KEYs in the Domain Name system (dns)," IETF RFC 3110, May 2001. [Online]. Available: http://www.ietf.org/rfc/rfc3110.txt.
    • (2001)
    • Eastlake, D.E.1
  • 15
    • 3142619105 scopus 로고    scopus 로고
    • Internet draft, March, work in progress, Online, Available
    • R. Moskowitz, P. Nikander, P. Jokela, and T. R. Henderson, "Host Identity Protocol," Internet draft, March 2006, work in progress. [Online]. Available: http://www.ietf.org/intemetdrafts/draft-ietf-hip-base-05.txt.
    • (2006) Host Identity Protocol
    • Moskowitz, R.1    Nikander, P.2    Jokela, P.3    Henderson, T.R.4
  • 17
    • 35248816546 scopus 로고    scopus 로고
    • SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols
    • Oct
    • H. Krawczyk, "SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols," Lecture Notes in Computer Science, vol. 2729, pp. 400-425, Oct. 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 400-425
    • Krawczyk, H.1
  • 25
    • 85191959720 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES), November 2001, FIPS 197. [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
    • Advanced Encryption Standard (AES), November 2001, FIPS 197. [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
  • 26
    • 85191939899 scopus 로고    scopus 로고
    • D. Whiting, R. Housley, and N. Ferguson, Counter with CBC-MAC (CCM), September 2003, RFC3610. [Online]. Available: http://www.faqs.org/ rfcs/rfc3610.html.
    • D. Whiting, R. Housley, and N. Ferguson, Counter with CBC-MAC (CCM), September 2003, RFC3610. [Online]. Available: http://www.faqs.org/ rfcs/rfc3610.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.