-
2
-
-
84858090248
-
IEEE 802.1AE-Media Access Control (MAC) Security
-
July, Online, Available
-
"IEEE 802.1AE-Media Access Control (MAC) Security," July 2006, [Online]. Available: http://www.ieee802.org/1/pages/802.1.ae.html.
-
(2006)
-
-
-
3
-
-
84892214814
-
Layer 2 - The weakest link: Security considerations at the Data Link Layer
-
First Quarter
-
C. Howard, "Layer 2 - The weakest link: Security considerations at the Data Link Layer," PACKET, vol. 15, no. 1, First Quarter 2003.
-
(2003)
PACKET
, vol.15
, Issue.1
-
-
Howard, C.1
-
4
-
-
85191940361
-
-
H. Altunbasak, S. Krasser, H. L. Owen, J. Grimminger, H.-P. Huth, and J. Sokol, Securing Layer 2 in Local Area Networks, in ICN, 2, Reunion, France, April 2005, pp. 699-706.
-
H. Altunbasak, S. Krasser, H. L. Owen, J. Grimminger, H.-P. Huth, and J. Sokol, "Securing Layer 2 in Local Area Networks," in ICN, vol. 2, Reunion, France, April 2005, pp. 699-706.
-
-
-
-
5
-
-
20544435149
-
Addressing the weak link between Layer 2 and Layer 3 in the Internet architecture
-
Tampa, Florida, November
-
H. Altunbasak, S. Krasser, H. Owen, J. Sokol, J. Grimminger, and H.-P. Huth, "Addressing the weak link between Layer 2 and Layer 3 in the Internet architecture," in Proc. of the 29th Annual IEEE Conference on Local Computer Networks (LCN), Tampa, Florida, November 2004.
-
(2004)
Proc. of the 29th Annual IEEE Conference on Local Computer Networks (LCN)
-
-
Altunbasak, H.1
Krasser, S.2
Owen, H.3
Sokol, J.4
Grimminger, J.5
Huth, H.-P.6
-
7
-
-
0142099692
-
-
November, Special Publication 800-48, Recommendations of the National Institute of Standards and Technology, Online, Available
-
T. Karygiannis and L. Owens, Wireless Network Security 802.11, Bluetooth and Handheld Devices, November 2002, Special Publication 800-48, Recommendations of the National Institute of Standards and Technology. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-48/NIST SP 800-48.pdf.
-
(2002)
Wireless Network Security 802.11, Bluetooth and Handheld Devices
-
-
Karygiannis, T.1
Owens, L.2
-
11
-
-
33746653289
-
NISCC vulnerability advisory IPSEC - 004033
-
May, Online, Available
-
"NISCC vulnerability advisory IPSEC - 004033," May 2005, [Online]. Available: http://www.niscc.gov.uk/niscc/docs/al-20050509-00386. html?lang=en.
-
(2005)
-
-
-
12
-
-
34047120649
-
-
Network Working Group Internet Draft, September, Online, Available
-
P. Nikander, J. Laganier, and F. Dupont, "A Non-Routable IPv6 Prefix for Keyed Hash Identifiers (KHI)," Network Working Group Internet Draft, September 2005. [Online]. Available: http://tools.ietf.org/wg/ipv6/draft- laganieripv6-khi-00.txt.
-
(2005)
A Non-Routable IPv6 Prefix for Keyed Hash Identifiers (KHI)
-
-
Nikander, P.1
Laganier, J.2
Dupont, F.3
-
13
-
-
33846315829
-
RSA/SHA-1 SIGs and RSA KEYs in the Domain Name system (dns)
-
IETF RFC 3110, May, Online, Available
-
Donald E. Eastlake, "RSA/SHA-1 SIGs and RSA KEYs in the Domain Name system (dns)," IETF RFC 3110, May 2001. [Online]. Available: http://www.ietf.org/rfc/rfc3110.txt.
-
(2001)
-
-
Eastlake, D.E.1
-
15
-
-
3142619105
-
-
Internet draft, March, work in progress, Online, Available
-
R. Moskowitz, P. Nikander, P. Jokela, and T. R. Henderson, "Host Identity Protocol," Internet draft, March 2006, work in progress. [Online]. Available: http://www.ietf.org/intemetdrafts/draft-ietf-hip-base-05.txt.
-
(2006)
Host Identity Protocol
-
-
Moskowitz, R.1
Nikander, P.2
Jokela, P.3
Henderson, T.R.4
-
16
-
-
0038687767
-
Efficient, dosresistant, secure key exchange for internet protocols
-
New York, NY, USA: ACM Press
-
W. Aiello, S. M. Bellovin, M. Blaze, J. Ioannidis, O. Reingold, R. Canetti, and A. D. Keromytis, "Efficient, dosresistant, secure key exchange for internet protocols," in CCS '02: Proceedings of the 9th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2002, pp. 48-58.
-
(2002)
CCS '02: Proceedings of the 9th ACM conference on Computer and communications security
, pp. 48-58
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Ioannidis, J.4
Reingold, O.5
Canetti, R.6
Keromytis, A.D.7
-
17
-
-
35248816546
-
SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols
-
Oct
-
H. Krawczyk, "SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols," Lecture Notes in Computer Science, vol. 2729, pp. 400-425, Oct. 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 400-425
-
-
Krawczyk, H.1
-
19
-
-
84949938425
-
Dos-resistant authentication with client puzzles
-
London, UK: Springer-Verlag
-
T. Aura, P. Nikander, and J. Leiwo, "Dos-resistant authentication with client puzzles," in Revised Papers from the 8th International Workshop on Security Protocols. London, UK: Springer-Verlag, 2001, pp. 170-177.
-
(2001)
Revised Papers from the 8th International Workshop on Security Protocols
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
21
-
-
0036983653
-
Dos and authentication in wireless public access networks
-
New York, NY, USA: ACM Press
-
D. B. Faria and D. R. Cheriton, "Dos and authentication in wireless public access networks," in WiSE '02: Proceedings of the 3rd ACM workshop on Wireless security. New York, NY, USA: ACM Press, 2002, pp. 47-56.
-
(2002)
WiSE '02: Proceedings of the 3rd ACM workshop on Wireless security
, pp. 47-56
-
-
Faria, D.B.1
Cheriton, D.R.2
-
22
-
-
11244278783
-
Steps towards a dosresistant internet architecture
-
New York, NY, USA: ACM Press
-
M. Handley and A. Greenhalgh, "Steps towards a dosresistant internet architecture," in FDNA '04: Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture. New York, NY, USA: ACM Press, 2004, pp. 49-56.
-
(2004)
FDNA '04: Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
, pp. 49-56
-
-
Handley, M.1
Greenhalgh, A.2
-
23
-
-
14844334596
-
Mitigating bandwidth exhaustion attacks using congestion puzzles
-
New York, NY, USA: ACM Press
-
X. Wang and M. K. Reiter, "Mitigating bandwidth exhaustion attacks using congestion puzzles," in CCS '04: Proceedings of the 11th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2004, pp. 257-267.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 257-267
-
-
Wang, X.1
Reiter, M.K.2
-
24
-
-
14844300104
-
New client puzzle outsourcing techniques for dos resistance
-
ACM Press, Online, Available
-
B. Waters, A. Juels, J. A. Halderman, and E. W. Felten, "New client puzzle outsourcing techniques for dos resistance," in Proceedings of the 11th ACM conference on Computer and communications security. ACM Press, 2004, pp. 246-256. [Online]. Available: www.cs.princeton.edu/jhalderm/papers/ ccs2004.pdf.
-
(2004)
Proceedings of the 11th ACM conference on Computer and communications security
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.W.4
-
25
-
-
85191959720
-
-
Advanced Encryption Standard (AES), November 2001, FIPS 197. [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
-
Advanced Encryption Standard (AES), November 2001, FIPS 197. [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
-
-
-
-
26
-
-
85191939899
-
-
D. Whiting, R. Housley, and N. Ferguson, Counter with CBC-MAC (CCM), September 2003, RFC3610. [Online]. Available: http://www.faqs.org/ rfcs/rfc3610.html.
-
D. Whiting, R. Housley, and N. Ferguson, Counter with CBC-MAC (CCM), September 2003, RFC3610. [Online]. Available: http://www.faqs.org/ rfcs/rfc3610.html.
-
-
-
|