Cryptographically Generated Addresses (CGA)

[1]  Pekka Nikander,et al.  Integrating Security, Mobility and Multi-Homing in a HIP Way , 2003, NDSS.

[2]  Tuomas Aura Mobile IPv6 Security , 2002, Security Protocols Workshop.

[3]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[4]  Gabriel Montenegro,et al.  IPv6 Opportunistic Encryption , 2002 .

[5]  Gabriel Montenegro,et al.  Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.

[6]  Michael Roe,et al.  Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.

[7]  Thomas Narten,et al.  Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2007, RFC.

[8]  David Mazières,et al.  Separating key management from file system security , 1999, SOSP.

[9]  Butler W. Lampson,et al.  SPKI Certificate Theory , 1999, RFC.

[10]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[11]  William Allen Simpson,et al.  Photuris: Session-Key Management Protocol , 1999, RFC.

[12]  J. Feigenbaum,et al.  The KeyNote trust management system version2, IETF RFC 2704 , 1999 .

[13]  Thomas Narten,et al.  Neighbor Discovery for IP Version 6 , 1998 .

[14]  Donald E. Eastlake,et al.  Domain Name System Security Extensions , 1997, RFC.

[15]  Thomas Narten,et al.  Neighbor Discovery for IP Version 6 (IPv6) , 1998, RFC.

[16]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[17]  Thomas Narten,et al.  IPv6 Stateless Address Autoconfiguration , 1996, RFC.

[18]  Stephen E. Deering,et al.  IP Version 6 Addressing Architecture , 1995, RFC.

[19]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.