메뉴 건너뛰기




Volumn , Issue , 1999, Pages 1-296

Security for telecommunications network management

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION MANAGEMENT; NETWORK MANAGEMENT; NETWORK PROTOCOLS; TELECOMMUNICATION INDUSTRY;

EID: 85036508654     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1109/9780470546390     Document Type: Book
Times cited : (3)

References (112)
  • 1
    • 0004246335 scopus 로고
    • National Bureau of Standards, U.S. Department of Commerce, December
    • NBS FIPS PUB 81, “DES Modes of Operation,” National Bureau of Standards, U.S. Department of Commerce, December 1980.
    • (1980) DES Modes of Operation
  • 3
    • 51749088711 scopus 로고
    • National Bureau of Standards, U.S. Department of Commerce, January
    • NBS FIPS PUB 46-1, “Data Encryption Standard,” National Bureau of Standards, U.S. Department of Commerce, January 1988.
    • (1988) Data Encryption Standard
  • 4
    • 0003508568 scopus 로고
    • National Institute of Standards and Technology, U.S. Department of Commerce, December
    • NIST FIPS PUB 46-2, “Data Encryption Standard,” National Institute of Standards and Technology, U.S. Department of Commerce, December 1993.
    • (1993) Data Encryption Standard
  • 5
    • 0003629991 scopus 로고
    • National Institute of Standards and Technology, U.S. Department of Commerce, April 17
    • NIST FIPS PUB 180-1, “Secure Hash Standard,” National Institute of Standards and Technology, U.S. Department of Commerce, April 17, 1995.
    • (1995) Secure Hash Standard
  • 6
    • 0003508562 scopus 로고
    • National Institute of Standards and Technology, U.S. Department of Commerce, May
    • NIST FIPS PUB 186, “Digital Signature Standard,” National Institute of Standards and Technology, U.S. Department of Commerce, May 1995.
    • (1995) Digital Signature Standard
  • 7
    • 85036592291 scopus 로고
    • Bellcore, June
    • GR-1253-CORE, TMN Security Administration, Issue 1 (Bellcore, June 1995).
    • (1995) TMN Security Administration , Issue.1
  • 26
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • N. Koblitz, “Elliptic Curve Cryptosystems,”Mathematics of Computation, vol. 48, 1987, pp. 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 30
    • 85015402934 scopus 로고    scopus 로고
    • Uses of Elliptic Curves in Cryptography,” Advances in Cryptology, CRYPTO’85
    • Springer-Verlag
    • V. Miller, “Uses of Elliptic Curves in Cryptography,” Advances in Cryptology, CRYPTO’85, Lecture Notes in Computer Science218, Springer-Verlag, pp. 417-426.
    • Lecture Notes in Computer Science , vol.218 , pp. 417-426
    • Miller, V.1
  • 32
    • 85036500733 scopus 로고
    • Forum 006
    • Network Management Forum, OMNIPoint 1 Definitions, Forum 006, Issue 1.0, August 1992.
    • (1992) OMNIPoint 1 Definitions , Issue.1 , pp. 0
  • 33
    • 85036558492 scopus 로고
    • Application Services: Security of Management
    • Forum 016, August
    • Application Services: Security of Management, Network Management Forum, Forum 016, Issue 1.0, August 1992.
    • (1992) Network Management Forum , Issue.1 , pp. 0
  • 37
    • 85036510786 scopus 로고    scopus 로고
    • OMG Document orbos/97-02-04
    • adopted June 24
    • Object Management Group, OMG Document orbos/97-02-04, Secure Socket Layer/CORBA Security, adopted June 24, 1997.
    • (1997) Secure Socket Layer/Corba Security
  • 38
  • 39
    • 85036576450 scopus 로고    scopus 로고
    • The Network Working Group of the IETF as an Informational Request has recently published this standard for Comments, RFC 2315
    • RSA Laboratories, a division of RSA Data Security, Inc., Public-Key Cryptography Standards #7—Cryptographic Message Syntax.(The Network Working Group of the IETF as an Informational Request has recently published this standard for Comments, RFC 2315.)
    • Public-Key Cryptography Standards #7—Cryptographic Message Syntax
  • 45
    • 0001826463 scopus 로고
    • The RC5 Encryption Algorithm
    • R. L. Rivest, “The RC5 Encryption Algorithm,”Dr. Dobb’s Journal,20, no. 1 (January 1995), pp. 146-148.
    • (1995) Dr. Dobb’s Journal , vol.20 , Issue.1 , pp. 146-148
    • Rivest, R.L.1
  • 47
    • 85036577582 scopus 로고
    • RFC 1320April
    • R. L. Rivest, “The MD4 Message Digest Algorithm,” RFC 1320, April 1992.
    • (1992)
    • Rivest, R.L.1
  • 52
  • 53
    • 85036579486 scopus 로고    scopus 로고
    • November, Status: INFORMATIONAL
    • IP Security Document Roadmap. R. Thayer, N. Doraswamy and R. Glenn. November 1998. (Status: INFORMATIONAL)
    • (1998)
    • Thayer, R.1    Doraswamy, N.2    Glenn, R.3
  • 55
    • 85036500817 scopus 로고    scopus 로고
    • November, Status: PROPOSED STANDARD
    • The Internet Key Exchange (IKE). D. Harkins and D. Carrel. November 1998. (Status: PROPOSED STANDARD)
    • (1998)
    • Harkins, D.1    Carrel, D.2
  • 56
    • 85036518877 scopus 로고    scopus 로고
    • November, Status: PROPOSED STANDARD
    • Internet Security Association and Key ManagementProtocol (ISAKMP). D. Maughan, M. Schertler, M. Schneider, and J. Turner. November 1998. (Status: PROPOSED STANDARD)
    • (1998)
    • Maughan, D.1    Schertler, M.2    Schneider, M.3    Turner, J.4
  • 57
    • 85036541790 scopus 로고    scopus 로고
    • November, Status: PROPOSED STANDARD
    • The Internet IP Security Domain of Interpretation for ISAKMP. D. Piper. November 1998. (Status: PROPOSED STANDARD)
    • (1998)
    • Piper, D.1
  • 58
    • 85036597234 scopus 로고    scopus 로고
    • November, Obsoletes RFC 1827, Status: PROPOSED STANDARD
    • IP Encapsulating Security Payload (ESP). S. Kent and R. Atkinson. November 1998. (Obsoletes RFC 1827) (Status: PROPOSED STANDARD)
    • (1998)
    • Kent, S.1    Atkinson, R.2
  • 59
    • 85036502101 scopus 로고    scopus 로고
    • November, Status: PROPOSED STANDARD
    • The ESP DES-CBC Cipher Algorithm with Explicit IV. C. Madson and N. Doraswamy. November 1998. (Status: PROPOSED STANDARD)
    • (1998)
    • Madson, C.1    Doraswamy, N.2
  • 60
    • 85036534142 scopus 로고    scopus 로고
    • November, Status: PROPOSED STANDARD
    • The Use of HMAC-SHA-1-96 within ESP and A.H. C. Madson and R. Glenn. November 1998. (Status: PROPOSED STANDARD)
    • (1998)
    • Madson, A.H.C.1    Glenn, R.2
  • 61
    • 85036525401 scopus 로고    scopus 로고
    • November, Status: PROPOSED STANDARD
    • The Use of HMAC-MD5-96 within ESP and A.H. C. Madson and R. Glenn. November 1998. (Status: PROPOSED STANDARD)
    • (1998)
    • Madson, A.H.C.1    Glenn, R.2
  • 62
    • 85036527925 scopus 로고    scopus 로고
    • November, Obsoletes RFC1826, Status: PROPOSED STANDARD
    • IP Authentication Header. S. Kent and R. Atkinson. November 1998. (Obsoletes RFC1826) (Status: PROPOSED STANDARD)
    • (1998)
    • Kent, S.1    Atkinson, R.2
  • 63
    • 85036552871 scopus 로고    scopus 로고
    • November, (Obsoletes RFC1825), Status: PROPOSED STANDARD
    • Security Architecture for the Internet Protocol. S. Kent and R. Atkinson. November 1998. (Obsoletes RFC1825) (Status: PROPOSED STANDARD)
    • (1998)
    • Kent, S.1    Atkinson, R.2
  • 64
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • R. Rivest, A. Shamir, and L. M. Adelman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,”Communications of the ACM,21, no. 2 (February 1978), pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adelman, L.M.3
  • 77
    • 85036597429 scopus 로고    scopus 로고
    • ECIC/94-001, Security Requirements for Electronic Bonding Between Two TMNs,1994.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.