메뉴 건너뛰기




Volumn , Issue , 1998, Pages

Automated Recovery in a Secure Bootstrap Process

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM RECOVERY; NETWORK ARCHITECTURE;

EID: 85073202707     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (27)

References (40)
  • 2
    • 0005305012 scopus 로고    scopus 로고
    • DHCP Options and BOOTP Vendor Extensions
    • Internet RFC 2132, March
    • S. Alexander and R. Droms. DHCP Options and BOOTP Vendor Extensions. Internet RFC 2132, March 1997.
    • (1997)
    • Alexander, S.1    Droms, R.2
  • 11
    • 85180542623 scopus 로고    scopus 로고
    • Authentication for DHCP Messages
    • August
    • R. Droms. Authentication for DHCP Messages. Work in Progress, August 1997.
    • (1997) Work in Progress
    • Droms, R.1
  • 13
    • 85180543145 scopus 로고    scopus 로고
    • Dynamic Name Service and Security
    • Internet RFC 2065, January
    • D. Eastlake and C. Kaufman. Dynamic Name Service and Security. Internet RFC 2065, January 1997.
    • (1997)
    • Eastlake, D.1    Kaufman, C.2
  • 17
    • 34248186150 scopus 로고
    • Bootstrap Loading using TFTP
    • Internet RFC 906, June
    • R. Finlayson. Bootstrap Loading using TFTP. Internet RFC 906, June 1984.
    • (1984)
    • Finlayson, R.1
  • 18
    • 0024664208 scopus 로고
    • Defending Systems Against Viruses through Cryptographic Authentication
    • IEEE
    • Y. D. G. Davida and B. Matt. Defending Systems Against Viruses through Cryptographic Authentication. In 1989 IEEE Symposium on Security and Privacy, pages 312–318. IEEE, 1989.
    • (1989) 1989 IEEE Symposium on Security and Privacy , pp. 312-318
    • Davida, Y. D. G.1    Matt, B.2
  • 20
    • 0347470584 scopus 로고
    • Fail-Stop Protocols: An Approach to Designing Secure Protocols
    • September
    • L. Gong and P. Syverson. Fail-Stop Protocols: An Approach to Designing Secure Protocols. In Proceedings of IFIP DCCA-5, September 1995.
    • (1995) Proceedings of IFIP DCCA-5
    • Gong, L.1    Syverson, P.2
  • 22
  • 23
    • 85180540651 scopus 로고    scopus 로고
    • July
    • M. Gutschke and K. Yap. Etherboot 3.2. http://www.syd.dit.csiro.au/staff/ken/personal/etherboot/, July 1997.
    • (1997) Etherboot 3.2
    • Gutschke, M.1    Yap, K.2
  • 26
    • 0003729341 scopus 로고    scopus 로고
    • HMAC:Keyed–Hashing for Message Authentication
    • Internet RFC 2104, February
    • H. Krawczyk, M. Bellare, and R. Canetti. HMAC:Keyed–Hashing for Message Authentication. Internet RFC 2104, February 1997.
    • (1997)
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 31
    • 85180534798 scopus 로고    scopus 로고
    • The Use of HMAC-SHA1-1-96 within ESP and AH
    • November
    • C. Madson and R. Glenn. The Use of HMAC-SHA1-1-96 within ESP and AH. Work in Progress, November 1997.
    • (1997) Work in Progress
    • Madson, C.1    Glenn, R.2
  • 34
    • 85180534857 scopus 로고    scopus 로고
    • Microsoft’s Developer Network Library, October
    • Microsoft. Authenticode Techonology. Microsoft’s Developer Network Library, October 1996.
    • (1996) Authenticode Techonology
  • 35
    • 0003508562 scopus 로고
    • N. I. of Standards. Technical Report FIPS-186, U.S. Department of Commerce, May
    • N. I. of Standards. Digital Signature Standard. Technical Report FIPS-186, U.S. Department of Commerce, May 1994.
    • (1994) Digital Signature Standard
  • 36
    • 0003629991 scopus 로고
    • N. I. of Standards. Technical Report FIPS-180-1, U.S. Department of Commerce, April Also known as: 59 Fed Reg 35317 (1994)
    • N. I. of Standards. Secure Hash Standard. Technical Report FIPS-180-1, U.S. Department of Commerce, April 1995. Also known as: 59 Fed Reg 35317 (1994).
    • (1995) Secure Hash Standard
  • 40
    • 0004274974 scopus 로고
    • The TFTP Protocol (revision 2)
    • Internet RFC 1350, July
    • K. R. Sollins. The TFTP Protocol (revision 2). Internet RFC 1350, July 1992.
    • (1992)
    • Sollins, K. R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.