Bibliography
Abadi, M., Burrows, M., Needham, R., ``A Logic of Authentication,'' ACM Transactions on Computer Systems, February 1990, Vol, 8, No. 1, pp. 18-36.
Abadi, M., Needham, R., ``Prudent Engineering Practice for Cryptographic Protocols,'' Proceedings of the IEEE Symposium on Security and Privacy, 1994, pp. 122-136.
Atkinson, R., ``IPv6 Security Architecture,'' IETF Draft, draft-ietf-ipngwg-sec-00.txt, February 1995.
Atkinson, R., ``IPv6 Authentication Header,'' IETF Draft, draft-ietf-ipngwg-auth-00.txt, February 1995.
Atkinson, R., ``IPv6 Encapsulating Security Payload (ESP),'' IETF Draft, draft-ietf-ipngwg-esp-00.txt, February 1995.
Aziz, A., ``Simple Key-Management for Internet Protocols (SKIP),'' IETF Draft, draft-ietf-ipsec-aziz-skip-00.txt, October 1994.
Bellovin, S., ``Security Problems in the TCP/IP Protocols Suite,'' Computer Communication Review, April 1989, Vol. 19, No. 2, pp. 32-48.
Bellovin, S., ``Security Concerns for IPng,'' ITEF RFC1675, August 1994.
Bhagwat, P., Perkins, C., ``A Mobile Networking System Based on Internet Protocol(IP)'', Proceedings of USENIX Mobile and Location-Independent Computing Conference, Cambridge MA., August 1993, pp. 69-82.
Blaze, M., Ioannidis, J., ``The Architecture and Implementation of Network-Layer Security Under Unix,'' Proceedings of the 4th USENIX Security Symposium, Santa Clara, CA., October 1993.
Braden, R., ``Report of IAB Workshop on Security in the Internet Architecture,'' IETF RFC1636, June 1994.
Cellular Digital Packet Data (CDPD) System Specification, Release 1.0, July 1993.
Chokhani, S., ``Toward a National Public Key Infrastructure,'' IEEE Communications Magazine, September 1994, pp. 70-74.
Eastlake, D., 3rd, Crocker, S., Schiller, J., ``Randomness Recommendations for Security,'' IETF RFC1750, December 1994.
Fingerle, B., ``GSM Signalling in Practice,'' Telecommunications, March 1994, pp. 59-62.
Haller, N., ``On Internet Authentication,'' ITEF RFC1704, October 1994.
Ioannidis, J., Duchamp, D., Maquire Jr., G. Q., Deering, S., ``IP-Based Protocols for Mobile Internetworking'', ACM Proceedings of SIGCOMM 1991, Sept. 1991, pp. 235-245.
Karn, P., ``The Photuris Key Management Protocol,'' IETF Draft, draft-karn-photuris-00.txt, December 1994.
Kohl, J., ``The Kerberos Network Authentication Service (V5),'' IETF RFC1510, September 1993.
Linehan, M., ``Comparison of Network-Level Security Protocols,'' IBM White Paper, 1994. Paper available via: http://www.watson.ibm.com:8080/search_paper.shtml.
Metzger, P., ``IPv4 Authentication Header,'' IETF Draft, draft-metzger-ah-01.txt, January 1995.
Metzger, P., ``IP Authentication Using Keyed MD5,'' IETF Draft, draft-metzger-md5-01.txt, March 1995.
Metzger, P., ``Encapsulating Security Payload (ESP),'' IETF Draft, draft-metzger-esp-01.txt, March 1995.
Metzger, P., ``The ESP Triple DES-CBC Transform,'' IETF Draft, draft-metzger-esp-des-cbc-02.txt, March 1995.
Molva, R., Samfat, D., Tsudik, G., ``Authentication of Mobile Users,'' IEEE Network, March/April 1994, pp. 26-34.
National Institute of Standards and Technology, ``Secure Data Network System (SDNS) Network, Transport, and Message Security Protocols, NISTIR 90-4250, February 1990.
Perkins, C., Editor, ``IP Mobility Support'', IETF Draft, draft-ietf-mobileip-protocol-09.txt, March 1995.
Shirey, R. W., ``Section 1: Introduction from the Security Architecture for Internet Protocols,'' IETF Draft, draft-irtf-psrg-secarch-sect1-00.txt, November 1994.
Wack, J. P., Carnahan, L. J., ``Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls,'' NIST Draft, November 1994.
back to Proposal Outline
Email to Jim Binkley:
jrb@cs.pdx.edu