메뉴 건너뛰기




Volumn , Issue , 1996, Pages 114-127

SKEME: A versatile secure key exchange mechanism for Internet

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET PROTOCOLS;

EID: 85018066264     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NDSS.1996.492418     Document Type: Conference Paper
Times cited : (150)

References (21)
  • 1
    • 0003470642 scopus 로고
    • Security architecture for the internet protocol
    • August
    • R. Atkinson, "Security Architecture for the Internet Protocol", RFC1825, August 1995.
    • (1995) RFC , vol.1825
    • Atkinson, R.1
  • 2
    • 0003254362 scopus 로고
    • IP authentication header
    • August
    • R. Atkinson, "IP Authentication Header", RFC1826, August 1995.
    • (1995) RFC , vol.1826
    • Atkinson, R.1
  • 3
    • 0343421217 scopus 로고
    • Internet Draft draft-ietf-ipsec-aziz-skip-02.txt September work in progress
    • A. Aziz, "Simple Key-Management for Internet Protocols (SKIP), " Internet Draft draft-ietf-ipsec-aziz-skip-02.txt, September 1995, work in progress.
    • (1995) Simple Key-Management for Internet Protocols (SKIP)
    • Aziz, A.1
  • 4
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • D. Stinson ed, Springer-Verlag (Full version available from the authors or from
    • M. Bellare and P. Rogaway, "Entity Authentication and Key Distribution, " Advances in Crypiology,-CRYPTO'93, Lecture Notes in Computer Science Vol. 773, D. Stinson ed, Springer-Verlag, 1994, pp. 232-249. (Full version available from the authors or from http://www-cse.ucsd.edu/users/mihir.)
    • (1994) Advances in Crypiology,-CRYPTO'93, Lecture Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 85084163550 scopus 로고    scopus 로고
    • Design and implementation of modular key management protocol and IP secure tunnel on aix
    • Also available from ftp site software.watson.ibm.com:/pub/security/mkmp-ipst-usenix.ps
    • P. Cheng, J. Garay, A. Herzberg, and H. Kraw-czyk, "Design and implementation of modular key management protocol and IP Secure Tunnel on AIX", In Proc. 5th USENIX UNIX Security Syposium, Salt Lake City, Also available from ftp site software.watson.ibm.com:/pub/security/mkmp-ipst-usenix.ps.
    • Proc. 5th USENIX UNIX Security Syposium, Salt Lake City
    • Cheng, P.1    Garay, J.2    Herzberg, A.3    Kraw-Czyk, H.4
  • 9
  • 10
    • 1542593353 scopus 로고
    • Authentication and authenticated key exchanges
    • Kluwer Academic Publishers
    • W. Dime, P. C. van Oorshot, and M. J. Wiener, "Authentication and Authenticated Key Exchanges", Designs, Codes and Cryptography, V. 2, Kluwer Academic Publishers, 1992, pp. 107-125.
    • (1992) Designs, Codes and Cryptography , vol.2 , pp. 107-125
    • Dime, W.1    Van Oorshot, P.C.2    Wiener, M.J.3
  • 11
  • 12
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • Goldwasser, S., S. Micali, "Probabilistic Encryption", JCSS, Vol. 28, No. 2, 1984, pp. 270-299.
    • (1984) JCSS , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 18
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham, and M.D. Schroeder, "Using encryption for authentication in large networks of computers", Comm. of the ACM, 21, 1978, pp. 993-999.
    • (1978) Comm. of the ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 19
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Sept.
    • B. C. Neuman and T. Ts'o. "Kerberos: An Authentication Service for Computer Networks", IEEE Communications, 32(9):33-38. Sept. 1994. http://nii.isi.edu/publications/kerberos-neuman-tso.html.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Tso, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.