Security Protocols for Networks and Internet: A Global Vision
暂无分享,去创建一个
José María de Fuentes | Arturo Ribagorda | Luis Hernández Encinas | A. Ribagorda | L. H. Encinas | J. M. D. Fuentes
[1] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[2] Philip Koopman,et al. 32-bit cyclic redundancy codes for Internet applications , 2002, Proceedings International Conference on Dependable Systems and Networks.
[3] Tom Yu,et al. Kerberos Authorization Data Container Authenticated by Multiple Message Authentication Codes (MACs) , 2016, RFC.
[4] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[5] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[6] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[7] Tatu Ylönen,et al. The Secure Shell (SSH) Authentication Protocol , 2006, RFC.
[8] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[9] Tatu Ylönen,et al. The Secure Shell (SSH) Protocol Architecture , 2006, RFC.
[10] Bruce Potter,et al. Wireless Security's Future , 2003, IEEE Secur. Priv..
[11] Timothy Stapko. CHAPTER 4 – The Secure Sockets Layer , 2008 .
[12] Mohammed Mahmudur Rahman,et al. A comparative study of WLAN security protocols: WPA, WPA2 , 2015, 2015 International Conference on Advances in Electrical Engineering (ICAEE).
[13] Daniel J. Barrett,et al. Ssh, the secure shell: the definitive guide, second edition , 2005 .
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Ronald L. Rivest,et al. Spritz - a spongy RC4-like stream cipher and hash function , 2016, IACR Cryptol. ePrint Arch..
[16] William Allen Simpson,et al. PPP Challenge Handshake Authentication Protocol (CHAP) , 1996, RFC.