Security threats in systems supporting IPv 6 mobility and state-ofthe art security solutions
暂无分享,去创建一个
[1] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[2] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Pierre Bieber,et al. A logic of communication in hostile environment , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.
[4] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[5] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[6] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[7] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[8] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[9] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[11] Volker Kessler,et al. Formal Semantics for Authentication Logics , 1996, ESORICS.
[12] D. M. Goldschlag,et al. Security issues in networks with Internet access , 1997 .
[13] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[14] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[15] James P. McDermott,et al. Attack net penetration testing , 2001, NSPW '00.
[16] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[17] Erland Jonsson,et al. Different Aspects of Security Problems in Network Operating Systems , 2002 .
[18] Markus Schumacher,et al. Collaborative attack modeling , 2002, SAC '02.
[19] Edwin K. P. Chong,et al. Efficient multicast stream authentication using erasure codes , 2003, TSEC.
[20] Salim Hariri,et al. Impact Analysis of Faults and Attacks in Large-Scale Networks , 2003, IEEE Secur. Priv..
[21] Birgit Pfitzmann,et al. A Universally Composable Cryptographic Library , 2003, IACR Cryptol. ePrint Arch..
[22] Marvin V. Zelkowitz,et al. Susceptibility matrix: a new aid to software auditing , 2004, IEEE Security & Privacy Magazine.
[23] Jari Arkko,et al. Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents , 2004, RFC.
[24] Shelby Evans,et al. Risk-based Systems Security Engineering: Stopping Attacks with Intention , 2004, IEEE Secur. Priv..
[25] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[26] Pekka Nikander,et al. Effects of mobility and multihoming on transport-protocol security , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[27] Simon S. Y. Shim,et al. Issues in high-speed Internet security , 2004, Computer.
[28] Stuart E. Schechter. Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.
[29] Shanshan Song,et al. Collaborative Internet Worm Containment , 2005, IEEE Secur. Priv..
[30] Diomidis Spinellis,et al. Handling and reporting security advisories: a scorecard approach , 2005, IEEE Security & Privacy Magazine.
[31] Erik Nordmark,et al. Threats Relating to IPv6 Multihoming Solutions , 2005, RFC.
[32] David M. Nicol. Modeling and Simulation in Security Evaluation , 2005, IEEE Secur. Priv..
[33] 김용성,et al. Fast Handovers for Mobile IPv6 구현 및 Mobile IPv6 와의 성능 평가 , 2005 .
[34] D. Richard Kuhn,et al. Challenges in securing voice over IP , 2005, IEEE Security & Privacy Magazine.
[35] Gary McGraw,et al. Knowledge for Software Security , 2005, IEEE Secur. Priv..
[36] Mehmet Sahinoglu,et al. Security meter: a practical decision-tree model to quantify risk , 2005, IEEE Security & Privacy Magazine.
[37] Gerald A. Marin. Network Security Basics , 2005, IEEE Secur. Priv..
[38] Axelle Apvrille,et al. Secure software development by example , 2005, IEEE Security & Privacy Magazine.
[39] Helayne T. Ray,et al. Toward an automated attack model for red teams , 2005, IEEE Security & Privacy Magazine.
[40] Peter Torr,et al. Demystifying the threat modeling process , 2005, IEEE Security & Privacy Magazine.
[41] Richard Ford,et al. Malcode Mysteries Revealed , 2005, IEEE Secur. Priv..
[42] Songwu Lu,et al. Securing a Wireless World , 2006, Proceedings of the IEEE.
[43] Pekka Nikander,et al. Host Identity Protocol (HIP) Architecture , 2006, RFC.
[44] Gerardo Giaretta. AAA Goals for Mobile IPv6 , 2006 .
[45] Dianxiang Xu,et al. Threat-driven modeling and verification of secure software using aspect-oriented Petri nets , 2006, IEEE Transactions on Software Engineering.
[46] Xia Wang,et al. Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems , 2007, Int. J. Inf. Comput. Secur..
[47] Francis Dupont,et al. Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture , 2007, RFC.