Journals and Technical Reports

   
H. Abelson, R. Anderson, S.M. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P.G. Neumann, R.L. Rivest, J.I. Schiller, and B. Schneier, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption," World Wide Web Journal, Vol. 2, No. 3, 1997, pp. 241-257.

BBN, "A History of the ARPANET: The First Decade," Technical Report of Bolt, Beranek, and Newman, Inc., 1981.

M. Bellare, R. Canetti, and H. Krawczyk, "Keying Hash Functions for Message Authentication," Advances in Cryptology Crypto'96 Proceedings, Lecture Notes in Computer Science Vol. 1109, Springer-Verlag, 1996.

M. Bellare and D. Micciancio, "A New Paradigm for Collision-free Hashing: Incrementality at Reduced Cost," Advances in Cryptology Eurocrypt'97 Proceedings, Lecture Notes in Computer Science Vol. 1233, Springer-Verlag, 1997.

S. Bellovin, M. Merritt, "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks," Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy, pp. 72-84, 1992.

S. Bellovin, "Problem Areas of the IP Security Protocols," Proceedings of the Sixth Usenix Unix Security Symposium, 1996.

R. Canetti, J. Garay, D. Micciancio, M. Naor, B. Pinkas, "Multicast Security: A Taxonomy of Secure Multicast Protocols and Efficient Authentication Schemes," Proceedings of INFOCOM'99, 1999.

D. Davies, W. Price, "The Application of Digital Signatures Based on Public-Key Cryptosystems," Proceedings of the Fifth International Computer Communications Conference, 1980.

S. Deering, "Multicast Routing in a Datagram Internetwork," STAN-CS-92, Stanford University, 1991

W. Diffie, M. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, Vol. IT-22, No. 6, pp. 644-654, 1976.

T. ElGamal, "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," Advances in Cryptology Proceedings of Crypto'84, Springer-Verlag, 1985.

J. Ellis, "The Possibility of Secure Non-Secret Digital Encryption," United Kingdom Communications-Electronics Security Group, 1970.

R. Gennaro and P. Rohatgi, "How to Sign Digital Streams," Proceedings of CRYPTO'97.

Hans Dobbertin, "The Status of MD5 after a Recent Attack," RSA Laboratories' CryptoBytes, Vol. 2, No. 2, Summer 1996.

National Institute of Standards and Technology, FIPS186, "Digital SignatureStandard," U.S. Department of Commerce, 1994.

National Institute of Standards and Technology, FIPS46-2, "Data Encryption Standard (DES)," U.S. Department of Commerce, 1977.

National Institute of Standards and Technology, FIPS81, "DES Modes of Operation," U.S. Department of Commerce, 1980.

National Institute of Standards and Technology, FIPS180-1, "Secure Hash Standard," U.S. Department of Commerce, 1995.

Research and Development in Advanced Communications Technologies in Europe, "RIPE Integrity Primitives: Final Report of RACE Integrity Primitives Evaluation," 1992.

R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, Vol. 21, No. 2, 1978.

RSA Laboratories, "PKCS#1: RSA Encryption Standard," version 1.5, 1993.

A. Scherbius, "Ciphering Machine," U.S. Patent #1657411.

B. Schneier, "The Blowfish Encryption Algorithm," Dr. Dobb's Journal, Vol. 19, No. 4, 1994

J. G. Steiner, B. C. Neuman, and J. I. Schiller, "Kerberos: An Authentication Service for Open Network Systems," Usenix Conference Proceedings, pages 183-190, February 1988.

J. T. Touch, "Performance Analysis of MD5," Computer Communication Review, Proceedings of ACM SIGCOMM'95.

C.K. Wong, M. Gouda, S. Lam, "Secure Group Communications Using Key Graphs," Technical Report of Department of Computer Sciences, University of Texas at Austin.

D. Wallner, E. Harder, R.C. Agee, "Key Management for Multicast: Issues and Architectures," National Security Agency technical document.


   
Top


IPSec(c) The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec (2nd Edition)
ISBN: 013046189X
EAN: 2147483647
Year: 2004
Pages: 76

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net