메뉴 건너뛰기




Volumn 5471 LNCS, Issue , 2009, Pages 197-216

Secure vpns for trusted computing environments

Author keywords

[No Author keywords available]

Indexed keywords

ANTI VIRUS; COMPLEX NETWORKS; CRITICAL SOFTWARE; ISOLATED AREAS; OPERATING SYSTEMS; REDUCED COMPLEXITY; REMOTE ATTESTATION; SECURE CHANNELS; SECURITY ISSUES; TRUSTED COMPUTING; TRUSTED COMPUTING GROUPS; VIRTUAL PRIVATE NETWORKS; VPN SERVICES;

EID: 70350635837     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00587-9_13     Document Type: Conference Paper
Times cited : (6)

References (36)
  • 2
    • 70350696050 scopus 로고    scopus 로고
    • Helmuth, C., Warg, A., Feske, N.: Mikro-SINA - Hands-on Experiences with the Nizza Security Architecture. In: Proceedings of the D.A.CH Security (March 2005)
    • Helmuth, C., Warg, A., Feske, N.: Mikro-SINA - Hands-on Experiences with the Nizza Security Architecture. In: Proceedings of the D.A.CH Security (March 2005)
  • 5
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 6
    • 70350699446 scopus 로고    scopus 로고
    • Cache missing for fun and profit
    • Percival, C.: Cache missing for fun and profit. In: Proceedings of BSDCan 2005 (2005)
    • (2005) Proceedings of BSDCan
    • Percival, C.1
  • 7
    • 70350689771 scopus 로고    scopus 로고
    • Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doorn, L., Griffin, J.L., Berger, S.: sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Research Report RC23511, IBM Research (February 2005)
    • Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doorn, L., Griffin, J.L., Berger, S.: sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Research Report RC23511, IBM Research (February 2005)
  • 9
    • 0036147270 scopus 로고    scopus 로고
    • Shapiro, J., Hardy, N.: EROS: A Principle-Driven Operating System from the Ground Up. IEEE Software, 26-33 (January 2002)
    • Shapiro, J., Hardy, N.: EROS: A Principle-Driven Operating System from the Ground Up. IEEE Software, 26-33 (January 2002)
  • 12
    • 84869637281 scopus 로고    scopus 로고
    • Diplomarbeit, Technische Universität Dresden November 2004
    • Syckor, J.: IPSec Infrastruktur für Mikro-SINA, Diplomarbeit, Technische Universität Dresden (November 2004), os.inf.tu-dresden.de/ papers-ps/syckor-diplom.pdf
    • IPSec Infrastruktur für Mikro-SINA
    • Syckor, J.1
  • 13
    • 70350669732 scopus 로고    scopus 로고
    • McDonald, D, Metz, C, Phan, B, PF-KEY Key Management API, Version 2. RFC 2367, Internet Engineering Task Force July 1998
    • McDonald, D., Metz, C., Phan, B.: PF-KEY Key Management API, Version 2. RFC 2367, Internet Engineering Task Force (July 1998)
  • 16
    • 0004006818 scopus 로고    scopus 로고
    • RFC 4302, Internet Engineering Task Force December
    • Kent, S.: IP Authentication Header. RFC 4302, Internet Engineering Task Force (December 2005)
    • (2005) IP Authentication Header
    • Kent, S.1
  • 21
    • 85084160050 scopus 로고    scopus 로고
    • Bellovin, S.: Problem Areas for the IP Security Protocols. In: Proceedings of the Sixth Usenix Security Symposium (July 1996)
    • Bellovin, S.: Problem Areas for the IP Security Protocols. In: Proceedings of the Sixth Usenix Security Symposium (July 1996)
  • 22
    • 70350653825 scopus 로고    scopus 로고
    • Degabriele, J.P., Paterson, K.G.: Attacking the IPsec Standards in Encryption-only Configurations (2007), eprint.iacr.org/2007/125
    • Degabriele, J.P., Paterson, K.G.: Attacking the IPsec Standards in Encryption-only Configurations (2007), eprint.iacr.org/2007/125
  • 24
    • 0005974305 scopus 로고    scopus 로고
    • IKE/ISAKMP Considered Harmful
    • December
    • Simpson, W.A.: IKE/ISAKMP Considered Harmful. Usenix, login 24(6) (December 1999)
    • (1999) Usenix, login , vol.24 , Issue.6
    • Simpson, W.A.1
  • 27
    • 33644781732 scopus 로고    scopus 로고
    • Uncovering identities: A study into VPN tunnel fingerprinting
    • Izadinia, V.D., Kourie, D., Eloff, J.: Uncovering identities: A study into VPN tunnel fingerprinting. Computers & Security 25(2), 97-105 (2006)
    • (2006) Computers & Security , vol.25 , Issue.2 , pp. 97-105
    • Izadinia, V.D.1    Kourie, D.2    Eloff, J.3
  • 28
    • 70350643690 scopus 로고    scopus 로고
    • Tcg storage architecture core specification
    • Storage Work Group, Technical report, Trusted Computing Group May
    • Storage Work Group. Tcg storage architecture core specification. Technical report, Trusted Computing Group (May 2007)
    • (2007)
  • 30
    • 84869637327 scopus 로고    scopus 로고
    • Alkassar, A., Stüble, C.: Die Sicherheitsplattform Turaya. In: Trusted Computing, pp. 86-96. Vieweg+Teubner (May 2008)
    • Alkassar, A., Stüble, C.: Die Sicherheitsplattform Turaya. In: Trusted Computing, pp. 86-96. Vieweg+Teubner (May 2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.