Security Requirements of Time Protocols in Packet Switched Networks
暂无分享,去创建一个
[1] Scott O. Bradner,et al. Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.
[2] Albert Treytl,et al. Securing IEEE 1588 by IPsec tunnels - An analysis , 2010, 2010 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.
[3] T. Mizrahi. A game theoretic analysis of delay attacks against time synchronization protocols , 2012, 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings.
[4] Yixian Xu. IPsec security for packet based synchronization , 2011 .
[5] David L. Mills,et al. Network Time Protocol Version 4: Autokey Specification , 2010, RFC.
[6] Tal Mizrahi. Time synchronization security using IPsec and MACsec , 2011, 2011 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.
[7] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[8] Stuart McClure,et al. Hacking Exposed; Network Security Secrets and Solutions , 1999 .
[9] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[10] Srdjan Capkun,et al. Secure Time Synchronization in Sensor Networks , 2008, TSEC.
[11] David L. Mills,et al. Internet Engineering Task Force (ietf) Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010 .
[12] G. Gaderer,et al. Traps and pitfalls in secure clock synchronization , 2007, 2007 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.
[13] Albert Treytl,et al. Secure tunneling of high-precision clock synchronization protocols and other time-stamped data , 2010, 2010 IEEE International Workshop on Factory Communication Systems Proceedings.
[14] Michael Thomas,et al. Kerberized Internet Negotiation of Keys (KINK) , 2006, RFC.
[15] Konstantin Beznosov,et al. A Security Analysis of the Precise Time Protocol (Short Paper) , 2006, ICICS.