Bibliography




  • Abadi, M., Burrows, M., Needham, R., ``A Logic of Authentication,'' ACM Transactions on Computer Systems, February 1990, Vol, 8, No. 1, pp. 18-36.

  • Abadi, M., Needham, R., ``Prudent Engineering Practice for Cryptographic Protocols,'' Proceedings of the IEEE Symposium on Security and Privacy, 1994, pp. 122-136.

  • Atkinson, R., ``IPv6 Security Architecture,'' IETF Draft, draft-ietf-ipngwg-sec-00.txt, February 1995.

  • Atkinson, R., ``IPv6 Authentication Header,'' IETF Draft, draft-ietf-ipngwg-auth-00.txt, February 1995.

  • Atkinson, R., ``IPv6 Encapsulating Security Payload (ESP),'' IETF Draft, draft-ietf-ipngwg-esp-00.txt, February 1995.

  • Aziz, A., ``Simple Key-Management for Internet Protocols (SKIP),'' IETF Draft, draft-ietf-ipsec-aziz-skip-00.txt, October 1994.

  • Bellovin, S., ``Security Problems in the TCP/IP Protocols Suite,'' Computer Communication Review, April 1989, Vol. 19, No. 2, pp. 32-48.

  • Bellovin, S., ``Security Concerns for IPng,'' ITEF RFC1675, August 1994.

  • Bhagwat, P., Perkins, C., ``A Mobile Networking System Based on Internet Protocol(IP)'', Proceedings of USENIX Mobile and Location-Independent Computing Conference, Cambridge MA., August 1993, pp. 69-82.

  • Blaze, M., Ioannidis, J., ``The Architecture and Implementation of Network-Layer Security Under Unix,'' Proceedings of the 4th USENIX Security Symposium, Santa Clara, CA., October 1993.

  • Braden, R., ``Report of IAB Workshop on Security in the Internet Architecture,'' IETF RFC1636, June 1994.

  • Cellular Digital Packet Data (CDPD) System Specification, Release 1.0, July 1993.

  • Chokhani, S., ``Toward a National Public Key Infrastructure,'' IEEE Communications Magazine, September 1994, pp. 70-74.

  • Eastlake, D., 3rd, Crocker, S., Schiller, J., ``Randomness Recommendations for Security,'' IETF RFC1750, December 1994.

  • Fingerle, B., ``GSM Signalling in Practice,'' Telecommunications, March 1994, pp. 59-62.

  • Haller, N., ``On Internet Authentication,'' ITEF RFC1704, October 1994.

  • Ioannidis, J., Duchamp, D., Maquire Jr., G. Q., Deering, S., ``IP-Based Protocols for Mobile Internetworking'', ACM Proceedings of SIGCOMM 1991, Sept. 1991, pp. 235-245.

  • Karn, P., ``The Photuris Key Management Protocol,'' IETF Draft, draft-karn-photuris-00.txt, December 1994.

  • Kohl, J., ``The Kerberos Network Authentication Service (V5),'' IETF RFC1510, September 1993.

  • Linehan, M., ``Comparison of Network-Level Security Protocols,'' IBM White Paper, 1994. Paper available via: http://www.watson.ibm.com:8080/search_paper.shtml.

  • Metzger, P., ``IPv4 Authentication Header,'' IETF Draft, draft-metzger-ah-01.txt, January 1995.

  • Metzger, P., ``IP Authentication Using Keyed MD5,'' IETF Draft, draft-metzger-md5-01.txt, March 1995.

  • Metzger, P., ``Encapsulating Security Payload (ESP),'' IETF Draft, draft-metzger-esp-01.txt, March 1995.

  • Metzger, P., ``The ESP Triple DES-CBC Transform,'' IETF Draft, draft-metzger-esp-des-cbc-02.txt, March 1995.

  • Molva, R., Samfat, D., Tsudik, G., ``Authentication of Mobile Users,'' IEEE Network, March/April 1994, pp. 26-34.

  • National Institute of Standards and Technology, ``Secure Data Network System (SDNS) Network, Transport, and Message Security Protocols, NISTIR 90-4250, February 1990.

  • Perkins, C., Editor, ``IP Mobility Support'', IETF Draft, draft-ietf-mobileip-protocol-09.txt, March 1995.

  • Shirey, R. W., ``Section 1: Introduction from the Security Architecture for Internet Protocols,'' IETF Draft, draft-irtf-psrg-secarch-sect1-00.txt, November 1994.

  • Wack, J. P., Carnahan, L. J., ``Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls,'' NIST Draft, November 1994.


    back to Proposal Outline

    Email to Jim Binkley:
    jrb@cs.pdx.edu