Next: Appendix: Specification of the
Up: On Searching for Known
Previous: Conclusion
- 1
-
R. Atkinson. IP encapsulating security payload (ESP). Request for Comments (Proposed Standard) RFC 1827,
Internet Engineering Task Force, August 1995.
- 2
-
R. Atkinson. Security architecture for the internet protocol. Request for Comments (Proposed Standard) RFC
1825, Internet Engineering Task Force, August 1995.
- 3
-
S. M. Bellovin, Problem Areas for the IP Security Protocols, Proceedings of the Sixth Usenix UNIX
Security Symposium, San Jose, CA, July, 1996.
- 4
-
C. Meadows, A System for the Specification and Verification of Key
Management Protocols, Proceedings of the 1991
IEEE Computer Society Symposium
in Research in Security and Privacy, May 1991.
- 5
-
C. Meadows, Applying Formal Methods to the Analysis of a Key Management
Protocol, The Journal of Computer Security, 1992:1,1, Jan, 1992.
- 6
-
C. Meadows, The NRL Protocol Analyzer: An Overview, J. Logic Programming, 1996:19, 20:1-679, Elsevier
Science, New York, NY, 1996.
- 7
-
Catherine Meadows, Analyzing the Needham-Schroeder Public-Key Protocol:
A Comparison of Two Approaches, Computer Security - ESORICS 96,
Springer-Verlag, September 1996, pp. 365-364.
- 8
-
P. Metzger, P. Karn, and W. Simpson. The ESP DES-CBC transform. Request for Comments (Proposed Standard)
RFC 1829, Internet Engineering Task Force, August 1995.
- 9
-
S. Stubblebine and V. Gligor, Protocol Design for Integrity Protection, IEEE Computer Society
Symposium on Research in Security and Privacy, Oakland, CA, May, 1993, pp. 41-53.
- 10
-
S. Stubblebine and V. Gligor, On Message Integrity in Cryptographic Protocols, IEEE Computer Society
Symposium on Research in Security and Privacy, Oakland, CA, May, 1992, pp. 85-104.
- 11
-
V. L. Voydock and S. T. Kent, Security Mechanisms In High- Level Network Protocols, Computing
Surveys, vol. 15, no. 2, June 1983.