-
1
-
-
0004246335
-
-
National Bureau of Standards, U.S. Department of Commerce, December
-
NBS FIPS PUB 81, “DES Modes of Operation,” National Bureau of Standards, U.S. Department of Commerce, December 1980.
-
(1980)
DES Modes of Operation
-
-
-
3
-
-
51749088711
-
-
National Bureau of Standards, U.S. Department of Commerce, January
-
NBS FIPS PUB 46-1, “Data Encryption Standard,” National Bureau of Standards, U.S. Department of Commerce, January 1988.
-
(1988)
Data Encryption Standard
-
-
-
4
-
-
0003508568
-
-
National Institute of Standards and Technology, U.S. Department of Commerce, December
-
NIST FIPS PUB 46-2, “Data Encryption Standard,” National Institute of Standards and Technology, U.S. Department of Commerce, December 1993.
-
(1993)
Data Encryption Standard
-
-
-
5
-
-
0003629991
-
-
National Institute of Standards and Technology, U.S. Department of Commerce, April 17
-
NIST FIPS PUB 180-1, “Secure Hash Standard,” National Institute of Standards and Technology, U.S. Department of Commerce, April 17, 1995.
-
(1995)
Secure Hash Standard
-
-
-
6
-
-
0003508562
-
-
National Institute of Standards and Technology, U.S. Department of Commerce, May
-
NIST FIPS PUB 186, “Digital Signature Standard,” National Institute of Standards and Technology, U.S. Department of Commerce, May 1995.
-
(1995)
Digital Signature Standard
-
-
-
7
-
-
85036592291
-
-
Bellcore, June
-
GR-1253-CORE, TMN Security Administration, Issue 1 (Bellcore, June 1995).
-
(1995)
TMN Security Administration
, Issue.1
-
-
-
26
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
N. Koblitz, “Elliptic Curve Cryptosystems,”Mathematics of Computation, vol. 48, 1987, pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
30
-
-
85015402934
-
Uses of Elliptic Curves in Cryptography,” Advances in Cryptology, CRYPTO’85
-
Springer-Verlag
-
V. Miller, “Uses of Elliptic Curves in Cryptography,” Advances in Cryptology, CRYPTO’85, Lecture Notes in Computer Science218, Springer-Verlag, pp. 417-426.
-
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
31
-
-
0003700417
-
-
Project Athena, MIT, December
-
S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer, “Project Athena Technical Plan Section E.2.1: Kerberos Authentication and Authorization System,” Project Athena, MIT, December 1987.
-
(1987)
Project Athena Technical Plan Section E.2.1: Kerberos Authentication and Authorization System
-
-
Miller, S.P.1
Neuman, B.C.2
Schiller, J.I.3
Saltzer, J.H.4
-
32
-
-
85036500733
-
-
Forum 006
-
Network Management Forum, OMNIPoint 1 Definitions, Forum 006, Issue 1.0, August 1992.
-
(1992)
OMNIPoint 1 Definitions
, Issue.1
, pp. 0
-
-
-
33
-
-
85036558492
-
Application Services: Security of Management
-
Forum 016, August
-
Application Services: Security of Management, Network Management Forum, Forum 016, Issue 1.0, August 1992.
-
(1992)
Network Management Forum
, Issue.1
, pp. 0
-
-
-
37
-
-
85036510786
-
OMG Document orbos/97-02-04
-
adopted June 24
-
Object Management Group, OMG Document orbos/97-02-04, Secure Socket Layer/CORBA Security, adopted June 24, 1997.
-
(1997)
Secure Socket Layer/Corba Security
-
-
-
38
-
-
0041915631
-
-
Version 1.5, November
-
RSA Data Security Inc., PKCS#1: RSA Encryption Standard, Version 1.5, November 1993.
-
(1993)
PKCS#1: RSA Encryption Standard
-
-
-
39
-
-
85036576450
-
-
The Network Working Group of the IETF as an Informational Request has recently published this standard for Comments, RFC 2315
-
RSA Laboratories, a division of RSA Data Security, Inc., Public-Key Cryptography Standards #7—Cryptographic Message Syntax.(The Network Working Group of the IETF as an Informational Request has recently published this standard for Comments, RFC 2315.)
-
Public-Key Cryptography Standards #7—Cryptographic Message Syntax
-
-
-
45
-
-
0001826463
-
The RC5 Encryption Algorithm
-
R. L. Rivest, “The RC5 Encryption Algorithm,”Dr. Dobb’s Journal,20, no. 1 (January 1995), pp. 146-148.
-
(1995)
Dr. Dobb’s Journal
, vol.20
, Issue.1
, pp. 146-148
-
-
Rivest, R.L.1
-
47
-
-
85036577582
-
-
RFC 1320April
-
R. L. Rivest, “The MD4 Message Digest Algorithm,” RFC 1320, April 1992.
-
(1992)
-
-
Rivest, R.L.1
-
52
-
-
0003892370
-
-
H. Orman. November, Status: INFORMATIONAL
-
The OAKLEY Key Determination Protocol. H. Orman. November 1998. (Status: INFORMATIONAL)
-
(1998)
The OAKLEY Key Determination Protocol
-
-
-
53
-
-
85036579486
-
-
November, Status: INFORMATIONAL
-
IP Security Document Roadmap. R. Thayer, N. Doraswamy and R. Glenn. November 1998. (Status: INFORMATIONAL)
-
(1998)
-
-
Thayer, R.1
Doraswamy, N.2
Glenn, R.3
-
55
-
-
85036500817
-
-
November, Status: PROPOSED STANDARD
-
The Internet Key Exchange (IKE). D. Harkins and D. Carrel. November 1998. (Status: PROPOSED STANDARD)
-
(1998)
-
-
Harkins, D.1
Carrel, D.2
-
56
-
-
85036518877
-
-
November, Status: PROPOSED STANDARD
-
Internet Security Association and Key ManagementProtocol (ISAKMP). D. Maughan, M. Schertler, M. Schneider, and J. Turner. November 1998. (Status: PROPOSED STANDARD)
-
(1998)
-
-
Maughan, D.1
Schertler, M.2
Schneider, M.3
Turner, J.4
-
57
-
-
85036541790
-
-
November, Status: PROPOSED STANDARD
-
The Internet IP Security Domain of Interpretation for ISAKMP. D. Piper. November 1998. (Status: PROPOSED STANDARD)
-
(1998)
-
-
Piper, D.1
-
58
-
-
85036597234
-
-
November, Obsoletes RFC 1827, Status: PROPOSED STANDARD
-
IP Encapsulating Security Payload (ESP). S. Kent and R. Atkinson. November 1998. (Obsoletes RFC 1827) (Status: PROPOSED STANDARD)
-
(1998)
-
-
Kent, S.1
Atkinson, R.2
-
59
-
-
85036502101
-
-
November, Status: PROPOSED STANDARD
-
The ESP DES-CBC Cipher Algorithm with Explicit IV. C. Madson and N. Doraswamy. November 1998. (Status: PROPOSED STANDARD)
-
(1998)
-
-
Madson, C.1
Doraswamy, N.2
-
60
-
-
85036534142
-
-
November, Status: PROPOSED STANDARD
-
The Use of HMAC-SHA-1-96 within ESP and A.H. C. Madson and R. Glenn. November 1998. (Status: PROPOSED STANDARD)
-
(1998)
-
-
Madson, A.H.C.1
Glenn, R.2
-
61
-
-
85036525401
-
-
November, Status: PROPOSED STANDARD
-
The Use of HMAC-MD5-96 within ESP and A.H. C. Madson and R. Glenn. November 1998. (Status: PROPOSED STANDARD)
-
(1998)
-
-
Madson, A.H.C.1
Glenn, R.2
-
62
-
-
85036527925
-
-
November, Obsoletes RFC1826, Status: PROPOSED STANDARD
-
IP Authentication Header. S. Kent and R. Atkinson. November 1998. (Obsoletes RFC1826) (Status: PROPOSED STANDARD)
-
(1998)
-
-
Kent, S.1
Atkinson, R.2
-
63
-
-
85036552871
-
-
November, (Obsoletes RFC1825), Status: PROPOSED STANDARD
-
Security Architecture for the Internet Protocol. S. Kent and R. Atkinson. November 1998. (Obsoletes RFC1825) (Status: PROPOSED STANDARD)
-
(1998)
-
-
Kent, S.1
Atkinson, R.2
-
64
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. Rivest, A. Shamir, and L. M. Adelman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,”Communications of the ACM,21, no. 2 (February 1978), pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.M.3
-
65
-
-
85036587429
-
-
ANSI Tl.210-1993, American National Standard for Telecommunications—Operations, Administration, Maintenance, and Provisioning (OAM&P)—Principles of Functions, Architectures, and Protocols for Telecommunications Management Network (TMN) Interfaces.
-
(1993)
American National Standard for Telecommunications—Operations, Administration, Maintenance, and Provisioning (OAM&P)—Principles of Functions, Architectures, and Protocols for Telecommunications Management Network (TMN) Interfaces
-
-
-
77
-
-
85036597429
-
-
ECIC/94-001, Security Requirements for Electronic Bonding Between Two TMNs,1994.
-
-
-
|