Security Gateway Extension Mechanism for Session Recovery in Virtual Private Network |
Kim, Jeong-Beom
(Dept.of Computer Sceince, Korea University)
Lee, Yun-Jung (Dept.of Computer Sceince, Korea University) Park, Nam-Sub (Dept.of Computer Sceince, Korea University) Kim, Tai-Yun (Dept.of Computer Sceince, Korea University) |
1 | Dave Kosiur, 'Building and Managing Virtual Private Networks?,' John Wiley & Sons, 1998 |
2 | Atkinson, R., 'Security Architecture for the Internet Protocol,' RFC 2401, NRL, November 1998 |
3 | Matt Blaze, 'Protocol Failure in the Escrowed Encryption Standard,' the 2nd ACM Conference on computer and Communications Security, pp. 59-67, 1994 DOI |
4 | Yair Frankel and Moti Yung, 'Escrow Encryption System Visited : Attacks. Analysis and Designs,' Cryto'95. Springer-Verlag, Lecture Notes in Computer Science, LNCS 963, pp.223-235, 1995 |
5 | Ross Anderson and Micheal Roe, 'The GCHQ Protocol and its Problems,' Eurocrypt'97. Springer-Verlag, Lecture Notes in Computer Science, LNCS 1233, pp. 134-148, 1997 |
6 | Adi Shamir, 'Partial key escrow : A new approach to software key escrow,' Key Escrow conference, 1995 |
7 | S. J. Kim, I. S. Lee, M. Mambo and S. J. Park, 'On the Difficulty of Key Recovery System,' Proc. of ISW'99 Information Security Workshop, Springer-Verlag, 1999 |
8 | D. Harkins, D. Carrel, 'The Internet Key Exchange (IKE),' RFC 2409, Cisco Systems, November 1998 |
9 | Tom Markham, Charles Williams, Key Recovery Header for IPSec, Draft Key Recovery Alliance Recommendation 2, April, 1998 |
10 | Atkinson, R., 'IP Authentication Header,' RFC 2402, NRL, November 1998 |
11 | Atkinson, R., 'IP Encapsulation Security Payload,' RFC 2406, NRL, November 1998 |
12 | Sabari Gupta, A Common Key Recovery Block Format: promoting Interoperability between dissimilar key recovery schemes, KRA white-paper, 1998 |
13 | Michael J.Markowitz and roge S.Schlafly, Key Recovery in SecretAgent Digital Signiture draft 5, June 11, 1997 |
14 | FreeS/WAN, http://www.freeswan.org/freeswan_trees/freeswan-1.8/doc/index.html |
15 | Christoper B. McCubbin, Ali Aydin Seluck, Deepinder Sidhu, 'Initialization Vector Attack on the IPsec Protocol Sutie', IEEE, Baltmore, 2000 DOI |
16 | Adi Shamir, 'Partial key escrow : A new approach to software key escrow,' Key escrow conference, 1995 |
17 | Brigit Pfizmann and Micheal Waidner, 'How to Break Fraud Detectable Key Recovery,' ACM Operationg Systems Review 32, 1998 DOI |