References
- The Internet Key Exchange (IKE) (RFC 2409)
- Internet Security Association and Key Management Protocol (ISAKMP) (RFC 2408)
- The Oakley Key Determination Protocol (RFC 2412)
- IP Authentication Header (AH) (RFC 2402)
- IP Encapsulating Security Payload (ESP) (RFC 2406)
- NIST, "Escrow Encryption Standard (EES)", Federal Information Processing Standard Pubilication (FIPS PUB) 185, 1994.
- H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P.Neumann, R. Rivest, J. Schiller, and B. Schneirer, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption",Technical report, 1997. Available from http://www.crypto.com/key-study.
- N. Jefferies, C. Mitchell, and M. Walker, "A Proposed Architecture for Trusted Third Party Services", in Cryptography: Policy and Algorithms, Proceedings: International Conference BrisAne, Lecture Notes In Computer Science, LNCS 1029, Springer-Verlag, 1995.
- T. Markham and C. Williams, "Key Recovery Header for IPSEC", Computers & Security, 19, 2000, Elsevier Science.
- D. Balenson and T. Markham, "ISAKMP Key Recovery Extensions", Computers & Security, 19, 2000, Elsevier Science.
- Su Rui-dan, Che Xiang-quan,Fu Shao-feng, Li Long-hai, Zhou Li-hua, ""Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case"", International Conference on Networks Security, Wireless Communications and Trusted Computing p . 719-723 2009.
- Internet Key Exchange Protocol (IKEv2) (RFC4306) http://www.ietf.org/rfc/rfc4306.txt.
- 이윤정, "IETF 표준 인터넷 프로토콜과 호환되는 TTP 기반 키 복구", 한국콘텐츠학회논문지 6권 6호, pp. 56-63, 2006. 6
- Y.J.Rhee,T.Y.Kim, ""Practical Solutions to Key Recovery Based on PKI in IP Security"", SAFECOMP 2002, LNCS 2434, pp. 44-52, 2002.
Cited by
- Threats Analysis and Mobile Key Recovery for Internet of Things vol.19, pp.5, 2016, https://doi.org/10.9717/kmms.2016.19.5.918