-
1
-
-
0034315483
-
Further analysis of the internet key exchange protocol
-
J. Zhou, “Further analysis of the Internet key exchange protocol”, Computer Communications, 23, 2000, pp. 1606-1612.
-
(2000)
Computer Communications
, vol.23
, pp. 1606-1612
-
-
Zhou, J.1
-
3
-
-
0003068282
-
Security architecture for the internet protocol
-
November
-
S. Kent and R. Atkinson, “Security Architecture for the Internet Protocol,” RFC 2401, November 1998.
-
(1998)
RFC 2401
-
-
Kent, S.1
Atkinson, R.2
-
4
-
-
35048860626
-
Analysis of key exchange protocols and their use for building secure channels
-
Springer-Verlag, Berlin/Heidelberg, LNCS
-
R. Canetti, H. Krawczyk. “Analysis of key exchange protocols and their use for building secure channels”, In Proc. Of Advances in Cryptology-Eurocrypt’01, Springer-Verlag, Berlin/Heidelberg, 2001, 453-474, LNCS.
-
(2001)
Proc. Of Advances in Cryptology-Eurocrypt’01
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
5
-
-
84867988176
-
An internet key exchange protocol based on public key infrastructure
-
English Edition
-
ZHU Jian-ming, MA Jian-feng. An Internet Key Exchange Protocol Based on Public Key Infrastructure, Journal of Shanghai University (English Edition), 2004
-
(2004)
Journal of Shanghai University
-
-
Zhu, J.-M.1
Ma, J.-F.2
-
6
-
-
0003272021
-
The internet key exchange (IKE)
-
November
-
D. Harkins and D. Carrel, “The Internet Key Exchange (IKE),” RFC 2409, November 1998.
-
(1998)
RFC 2409
-
-
Harkins, D.1
Carrel, D.2
-
7
-
-
0034315111
-
Key exchange in IPSec: Analysis of IKE
-
November-December
-
Radia Perlman and Charlie Kaufman, “Key Exchange in IPSec: Analysis of IKE,” IEEE Internet Computing, November-December, 2000, pp. 50-56.
-
(2000)
IEEE Internet Computing
, pp. 50-56
-
-
Perlman, R.1
Kaufman, C.2
-
8
-
-
0034227286
-
Methods and protocols for secure key negotiation using IKE
-
July-August
-
Michael S. Borella, “Methods and Protocols for Secure Key Negotiation Using IKE,” IEEE Networks, July-August 2000, pp. 18-29.
-
(2000)
IEEE Networks
, pp. 18-29
-
-
Borella, M.S.1
-
14
-
-
0003294637
-
The OAKLEY key determination protocol
-
H. Orman, “The OAKLEY Key Determination Protocol,” RFC 2412, 1998.
-
(1998)
RFC 2412
-
-
Orman, H.1
-
15
-
-
0003357112
-
Internet security association and key management protocol (ISAKMP)
-
D. Maughan et al., “Internet Security Association and Key Management Protocol (ISAKMP),” RFC 2408, 1998.
-
(1998)
RFC 2408
-
-
Maughan, D.1
-
18
-
-
73149117349
-
A new authentication and key exchange protocol for insecure networks
-
H. Fereidooni, H. Taheri and M. Mahramian, “A new authentication and key exchange protocol for insecure networks”, proceedings of the fifth international conference on Wireless Communication, Networking and Mobile Computing (WiCom’09), 2009, pp. 1-4.
-
(2009)
Proceedings of The Fifth International Conference on Wireless Communication, Networking and Mobile Computing (WiCom’09)
, pp. 1-4
-
-
Fereidooni, H.1
Taheri, H.2
Mahramian, M.3
-
19
-
-
80051478062
-
A protocol for internet key exchange (IKE) using public encryption key and public signature key
-
July
-
V. Nagalakshmi and I. Rameshbabu, “A protocol for internet key exchange (IKE) using public encryption key and public signature key”, International Journal of Computer Science and Network Security, vol. 7, No. 7, July 2007, pp. 342-346.
-
(2007)
International Journal of Computer Science and Network Security
, vol.7
, Issue.7
, pp. 342-346
-
-
Nagalakshmi, V.1
Rameshbabu, I.2
-
23
-
-
11244267013
-
-
Springer-Verlag, New York, USA
-
D Hankerson, A Menezes, S Vanstone. “Guide to elliptic curve cryptography”. 2004, Springer-Verlag, New York, USA.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
24
-
-
0000112683
-
Elliptic curve cryptosystem
-
Janaury
-
N Koblitz. “Elliptic Curve Cryptosystem”. Journal of mathematics computation, Janaury 1987, 48(177):203-2009.
-
(1987)
Journal of Mathematics Computation
, vol.48
, Issue.177
, pp. 203-2009
-
-
Koblitz, N.1
-
25
-
-
0000838441
-
Use of elliptic curves in cryptography
-
LNCS 218
-
V Miller. “Use of elliptic curves in cryptography”. Advances in Cryptology-CRYPTO, 85 (LNCS 218), 1985:417-426.
-
(1985)
Advances in Cryptology-CRYPTO
, vol.85
, pp. 417-426
-
-
Miller, V.1
-
26
-
-
84870714291
-
-
RFC 5758, January
-
Q. Dang, S. Santesson, K. Moriarty, D. Brown and T. Polk, “Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA”, RFC 5758, January 2010.
-
(2010)
Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA
-
-
Dang, Q.1
Santesson, S.2
Moriarty, K.3
Brown, D.4
Polk, T.5
-
27
-
-
84892506781
-
Design of improved password authentication and update scheme based on elliptic curve cryptography
-
press
-
SK Hafizul Islam and G. P. Biswas, “Design of improved password authentication and update scheme based on elliptic curve cryptography”, Mathematical and Computer Modeling (2011), doi:10.1016/j.mcm.2011.07.001, in press.
-
(2011)
Mathematical and Computer Modeling
-
-
Hafizul Islam, S.K.1
Biswas, G.P.2
-
28
-
-
29144489246
-
Public key infrastructure overview
-
Sun Blue Prints™ Online August
-
J. Weise, ‘Public Key Infrastructure Overview’, Sun PSSM Global Security Practice, Sun Blue Prints™ Online - August 2001.
-
(2001)
Sun PSSM Global Security Practice
-
-
Weise, J.1
-
31
-
-
77951284170
-
Algorithms and identifiers for the internet x.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
April
-
W. Polk, R. Housley and L. Bassham, “Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, RFC 3279, April 2002.
-
(2002)
RFC 3279
-
-
Polk, W.1
Housley, R.2
Bassham, L.3
-
32
-
-
84870708313
-
Additional algorithms and identifiers for RSA cryptography for use in the internet x.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
June
-
J. Schaad, B. Kaliski and R. Housley, “Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, RFC 4055, June 2005.
-
(2005)
RFC 4055
-
-
Schaad, J.1
Kaliski, B.2
Housley, R.3
-
33
-
-
79751509497
-
Establishment of authenticated secret session keys using digital signature standard
-
G. P. Biswas, “Establishment of Authenticated Secret Session Keys Using Digital Signature Standard”, Information Security Journal: A Global Prospective, 2011, 20(1): 09-16.
-
(2011)
Information Security Journal: A Global Prospective
, vol.20
, Issue.1
, pp. 09-16
-
-
Biswas, G.P.1
|