Security Analyses of Network Time Services
暂无分享,去创建一个
[1] Mike St. Johns. Draft revised IP security option , 1988, RFC.
[2] David L. Mills. Network Time Protocol (version 2) specification and implementation , 1989, RFC.
[3] Steve Kent,et al. Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management , 1989, RFC.
[4] David L. Mills,et al. Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..
[5] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[6] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[7] David L. Mills,et al. On the Accuracy and Stablility of Clocks Synchronized by the Network Time Protocol in the Internet System , 1989, CCRV.
[8] Jeffrey D. Case,et al. Simple Network Management Protocol (SNMP) , 1989, RFC.
[9] LouAnna Notargiacomo,et al. Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] Jon Postel,et al. User Datagram Protocol , 1980, RFC.
[11] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.