Archived NIST Technical Series Publication
暂无分享,去创建一个
[1] P. Hoffman. Enhanced Security Services for S/MIME , 1999, RFC.
[2] Keith Moore. MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text , 1996, RFC.
[3] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[4] John Viega,et al. The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH , 2006, RFC.
[5] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[6] Derrell Piper,et al. The Internet IP Security Domain of Interpretation for ISAKMP , 1998, RFC.
[7] Jeffrey I. Schiller,et al. Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2) , 2005, RFC.
[8] Paul V. Mockapetris,et al. Domain names - implementation and specification , 1987, RFC.
[9] John Viega,et al. The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP) , 2005, RFC.
[10] Scott Rose,et al. Protocol Modifications for the DNS Security Extensions , 2005, RFC.
[11] Scott Rose,et al. Resource Records for the DNS Security Extensions, RFC 4034 | NIST , 2005 .
[12] Jakob Jonsson,et al. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 , 2003, RFC.
[13] Paul V. Mockapetris,et al. Domain names: Concepts and facilities , 1983, RFC.
[14] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[15] Russ Housley,et al. Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP) , 2004, RFC.
[16] Cheryl Madson,et al. The ESP DES-CBC Cipher Algorithm With Explicit IV , 1998, RFC.
[17] Charlie Kaufman,et al. Internet Key Exchange (IKEv2) Protocol , 2005, RFC.
[18] Jim Schaad,et al. Certificate Management Messages over CMS , 2000, RFC.
[19] Scott Rose,et al. DNS Security Introduction and Requirements , 2005, RFC.
[20] Paul E. Hoffman,et al. Algorithms for Internet Key Exchange version 1 (IKEv1) , 2005, RFC.
[21] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[22] Russ Housley,et al. Advanced Encryption Standard (AES) Key Wrap Algorithm , 2002, RFC.
[23] Paul E. Hoffman,et al. IKEv2 Clarifications and Implementation Guidelines , 2006, RFC.
[24] Jim Sermersheim,et al. Lightweight Directory Access Protocol (LDAP): The Protocol , 2006, RFC.
[25] Russ Housley,et al. Suite B Profile for Transport Layer Security (TLS) , 2009, RFC.
[26] Scott Rose,et al. Resource Records for the DNS Security Extensions , 2005, RFC.
[27] Paul E. Hoffman,et al. The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE) , 2004, RFC.
[28] Scott Rose,et al. DNS Security Introduction and Requirements , 2005, RFC.
[29] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[30] Eric Rescorla,et al. Diffie-Hellman Key Agreement Method , 1999, RFC.
[31] Sheila Frankel,et al. Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec , 2007, RFC.
[32] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[33] Stephen T. Kent,et al. The NULL Encryption Algorithm and Its Use With IPsec , 1998, RFC.
[34] Jim Schaad,et al. Certificate Management over CMS (CMC) , 2008, RFC.
[35] Burton S. Kaliski,et al. PKCS #7: Cryptographic Message Syntax Version 1.5 , 1998, RFC.
[36] Vishwas Manral,et al. Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH) , 2005, RFC.
[37] Ben Laurie,et al. DNS Security (DNSSEC) Hashed Authenticated Denial of Existence , 2008, RFC.
[38] Rob Adams,et al. The ESP CBC-Mode Cipher Algorithms , 1998, RFC.
[39] Kurt D. Zeilenga,et al. Lightweight Directory Access Protocol (LDAP): Directory Information Models , 2006, RFC.
[40] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[41] Jerome A. Solinas,et al. Suite B Cryptographic Suites for IPsec , 2007, RFC.
[42] Larry Zhu,et al. Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) , 2006, RFC.
[43] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[44] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[45] Sheila Frankel,et al. The AES-CBC Cipher Algorithm and Its Use with IPsec , 2003, RFC.
[46] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[47] Daniel Massey,et al. Protocol Modifications for the DNS Security Extensions RFC 4035 | NIST , 2005 .
[48] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.
[49] Cheryl Madson,et al. The Use of HMAC-SHA-1-96 within ESP and AH , 1998, RFC.
[50] Carlisle M. Adams,et al. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.
[51] Paul E. Hoffman,et al. Cryptographic Suites for IPsec , 2005, RFC.
[52] Russ Housley,et al. Cryptographic Message Syntax (CMS) , 2002, RFC.
[53] Stephen T. Kent,et al. IP Authentication Header , 1995, RFC.
[54] Jim Schaad,et al. Enhanced Security Services (ESS) Update: Adding CertID Algorithm Agility , 2007, RFC.