메뉴 건너뛰기




Volumn 1146, Issue , 1996, Pages 146-159

Sleepy network-layer authentication service for IPSEC

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; GATEWAYS (COMPUTER NETWORKS); NETWORK LAYERS; SECURITY SYSTEMS;

EID: 84949777279     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-61770-1_34     Document Type: Conference Paper
Times cited : (2)

References (25)
  • 2
    • 84949833589 scopus 로고
    • Report of TAB Workshop on Security in the Internet Architecture. RFC 1636, June, Network Working Group
    • R. Braden, D. Clark, S. Crocker, and C. Huitema. Report of TAB Workshop on Security in the Internet Architecture. RFC 1636, June 1994. Network Working Group.
    • (1994)
    • Braden, R.1    Clark, D.2    Crocker, S.3    Huitema, C.4
  • 4
    • 0000874415 scopus 로고
    • Limitations of the Kerberos Authentication System
    • October
    • S.M. Bellovin and M. Merritt. Limitations of the Kerberos Authentication System. Computer Communication Review, 20(5):119-132, October 1990.
    • (1990) Computer Communication Review , vol.20 , Issue.5 , pp. 119-132
    • Bellovin, S.M.1    Merritt, M.2
  • 6
    • 84949833590 scopus 로고
    • CDPD Forum, Release 1.1, January
    • Cellular Digital Packet Data System Specification. CDPD Forum, Release 1.1, January 1995.
    • (1995)
  • 8
    • 0023294428 scopus 로고
    • An Intrusion-Detection Model
    • February
    • Dorothy Denning. An Intrusion-Detection Model. IEEE Transactions on Software Engineering, SE-13(2):222-232,February 1987.
    • (1987) IEEE Transactions on Software Engineering , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 11
    • 84949833592 scopus 로고
    • Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2). RFC 1446May, Network Working Group
    • J. GaJvin and K. McCloghrie. Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2). RFC 1446, May 1993. Network Working Group.
    • (1993)
    • Gajvin, J.1    McCloghrie, K.2
  • 12
    • 3643099372 scopus 로고
    • The Architecture and Implementation of Network-Layer Security Under Unix
    • October
    • John Ioannidis and Matt Blaze. The Architecture and Implementation of Network-Layer Security Under Unix. In 4th Usenix Security Symposium, October 1993.
    • (1993) 4Th Usenix Security Symposium
    • Ioannidis, J.1    Blaze, M.2
  • 14
    • 84949833595 scopus 로고    scopus 로고
    • H0tJava(tm): The Security Story. Java home page
    • Sun Microsystems. H0tJava(tm): The Security Story. Java home page.
  • 16
    • 84949833597 scopus 로고    scopus 로고
    • Technical Report TR-95-15, CS Department, University of Arizona, Tucson, AZ, January
    • Hilarie Orman. Evolving an Implementation of a Network Level Security. Technical Report TR-95-15, CS Department, University of Arizona, Tucson, AZ, January 1996.
    • (1996) Evolving an Implementation of a Network Level Security
    • Orman, H.1
  • 17
    • 84949833598 scopus 로고    scopus 로고
    • IP Mobility Support, draft 15. Internet Draft, IETF, Mobile IP Working Group
    • Charles Perkins. IP Mobility Support, draft 15. Internet Draft, IETF, February 1996. Mobile IP Working Group.
    • (1996)
    • Perkins, C.1
  • 18
    • 0002473030 scopus 로고
    • DIDS (Distributed Intrusion Detection System) - Motivation,Architecture, and an Early Prototype
    • et. al. Steven R. Snapp. DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and an Early Prototype. In 14th National Computer Security Conference, pages 167-176, October 1991.
    • (1991) 14Th National Computer Security Conference, , pp. 167-176
    • Snapp, S.R.1
  • 23
    • 84949743023 scopus 로고
    • On Implementing a Protocol Independent MIB
    • Plenum Press, New York
    • Shyhtsun F. Wu, Subrata Mazumdar, Stephen Brady, and David Levine. On Implementing a Protocol Independent MIB. In Network Management and Control, volume 2, pages 309-329. Plenum Press, New York, 1994.
    • (1994) Network Management and Control , vol.2 , pp. 309-329
    • Shyhtsun, F.W.1    Mazumdar, S.2    Brady, S.3    Levine, D.4
  • 25
    • 2442608984 scopus 로고
    • Security versus Performance Requirements in Data Communication Systems
    • Brighton, UK, November
    • Vasilios Zorkadis. Security versus Performance Requirements in Data Communication Systems. In Computer Security- ESORICS 94, pages 19-30, Brighton, UK, November 1994.
    • (1994) Computer Security- ESORICS 94 , pp. 19-30
    • Zorkadis, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.