Check out the new USENIX Web site. next up previous
Next: About this document ... Up: A Study of the Protocols Previous: Concluding Remarks

References

1
TTCP: a test of TCP and UDP Performance.
USNA, 1984.

2
T. Dierks and C. Allen.
The TLS protocol version 1.0.
Request for Comments (Proposed Standard) 2246, Internet Engineering Task Force, January 1999.

3
Niklas Hallqvist and Angelos D. Keromytis.
Implementing Internet Key Exchange (IKE).
In Proceedings of the Annual USENIX Technical Conference, Freenix Track, pages 201-214, June 2000.

4
D. Harkins and D. Carrel.
The Internet Key Exchange (IKE).
Request for Comments (Proposed Standard) 2409, Internet Engineering Task Force, November 1998.

5
John Ioannidis and Matt Blaze.
The Architecture and Implementation of Network-Layer Security Under Unix.
In Fourth Usenix Security Symposium Proceedings. USENIX, October 1993.

6
S. Kent and R. Atkinson.
IP Authentication Header.
Request for Comments (Proposed Standard) 2402, Internet Engineering Task Force, November 1998.

7
S. Kent and R. Atkinson.
IP Encapsulating Security Payload (ESP).
Request for Comments (Proposed Standard) 2406, Internet Engineering Task Force, November 1998.

8
S. Kent and R. Atkinson.
Security Architecture for the Internet Protocol.
Request for Comments (Proposed Standard) 2401, Internet Engineering Task Force, November 1998.

9
A. D. Keromytis, J. Ioannidis, and J. M. Smith.
Implementing IPsec.
In Proceedings of Global Internet (GlobeCom) '97, pages 1948 - 1952, November 1997.

10
D. McDonald, C. Metz, and B. Phan.
PF_KEY Key Management API, Version 2.
Request for Comments (Informational) 2367, Internet Engineering Task Force, July 1998.

11
T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne, and S. Lehtinen.
SSH Protocol Architecture.
Internet Draft, Internet Engineering Task Force, February 1999.
Work in progress.



Stefan Miltchev
4/17/2002