Next: About this document ...
Up: Implementing Internet Key Exchange
Previous: Availability
- 1
-
R. Atkinson.
IP Authentication Header.
RFC 1826, August 1995.
- 2
-
R. Atkinson.
IP Encapsulating Security Payload.
RFC 1827, August 1995.
- 3
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis.
The role of trust management in distributed systems security.
In Secure Internet Programming, volume 1603 of Lecture
Notes in Computer Science, pages 185-210. Springer-Verlag Inc., New York,
NY, USA, 1999.
- 4
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis.
The keynote trust management system version 2.
Internet RFC 2704, September 1999.
- 5
-
M. Blaze, J. Feigenbaum, and J. Lacy.
Decentralized Trust Management.
In Proc. of the 17th Symposium on Security and Privacy, pages
164-173. IEEE Computer Society Press, Los Alamitos, 1996.
- 6
-
M. Blaze, J. Ioannidis, and A. Keromytis.
Trust Management and Network Layer Security Protocols.
In Proceedings of the 1999 Cambridge Security Protocols
International Workshop. Springer, 1999.
- 7
-
Consultation Committee.
X.509: The Directory Authentication Framework.
International Telephone and Telegraph, International
Telecommunications Union, Geneva, 1989.
- 8
-
T. de Raadt, N. Hallqvist, A. Grabowski, A. D. Keromytis, and N. Provos.
Cryptography in OpenBSD: An Overview.
In Proc. of the 1999 USENIX Annual Technical Conference, Freenix
Track, pages 93 - 101, June 1999.
- 9
-
W. Diffie and M.E. Hellman.
New Directions in Cryptography.
IEEE Transactions on Information Theory, IT-22(6):644-654,
Nov 1976.
- 10
-
D. Eastlake and C. Kaufman.
Dynamic Name Service and Security.
Internet RFC 2065, January 1997.
- 11
-
D. Harkins and D. Carrel.
The internet key exchange (IKE).
Request for Comments (Proposed Standard) 2409, Internet Engineering
Task Force, November 1998.
- 12
-
John Ioannidis and Matt Blaze.
The Architecture and Implementation of Network-Layer Security Under
Unix.
In Fourth Usenix Security Symposium Proceedings. USENIX,
October 1993.
- 13
-
P. Karn and W. Simpson.
Photuris: Session-key management protocol.
Request for Comments (Experimental) 2522, Internet Engineering Task
Force, March 1999.
- 14
-
S. Kent and R. Atkinson.
Security architecture for the internet protocol.
Request for Comments (Proposed Standard) 2401, Internet Engineering
Task Force, November 1998.
- 15
-
A. D. Keromytis, J. Ioannidis, and J. M. Smith.
Implementing IPsec.
In Proceedings of Global Internet (GlobeCom) '97, pages 1948 -
1952, November 1997.
- 16
-
D. McDonald, C. Metz, and B. Phan.
PF_KEY Key Management API, Version 2.
Request for Comments (Informational) 2367, Internet Engineering Task
Force, July 1998.
- 17
-
W. A. Simpson.
IKE/ISAKMP Considered Harmful.
USENIX ;login:, December 1999.
Angelos D. Keromytis
4/20/2000