1 |
Y.J.Rhee,T.Y.Kim, ""Practical Solutions to Key Recovery Based on PKI in IP Security"", SAFECOMP 2002, LNCS 2434, pp. 44-52, 2002.
|
2 |
The Internet Key Exchange (IKE) (RFC 2409)
|
3 |
Internet Security Association and Key Management Protocol (ISAKMP) (RFC 2408)
|
4 |
The Oakley Key Determination Protocol (RFC 2412)
|
5 |
IP Authentication Header (AH) (RFC 2402)
|
6 |
IP Encapsulating Security Payload (ESP) (RFC 2406)
|
7 |
NIST, "Escrow Encryption Standard (EES)", Federal Information Processing Standard Pubilication (FIPS PUB) 185, 1994.
|
8 |
H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P.Neumann, R. Rivest, J. Schiller, and B. Schneirer, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption",Technical report, 1997. Available from http://www.crypto.com/key-study.
|
9 |
N. Jefferies, C. Mitchell, and M. Walker, "A Proposed Architecture for Trusted Third Party Services", in Cryptography: Policy and Algorithms, Proceedings: International Conference BrisAne, Lecture Notes In Computer Science, LNCS 1029, Springer-Verlag, 1995.
|
10 |
T. Markham and C. Williams, "Key Recovery Header for IPSEC", Computers & Security, 19, 2000, Elsevier Science.
|
11 |
이윤정, "IETF 표준 인터넷 프로토콜과 호환되는 TTP 기반 키 복구", 한국콘텐츠학회논문지 6권 6호, pp. 56-63, 2006. 6
|
12 |
D. Balenson and T. Markham, "ISAKMP Key Recovery Extensions", Computers & Security, 19, 2000, Elsevier Science.
|
13 |
Su Rui-dan, Che Xiang-quan,Fu Shao-feng, Li Long-hai, Zhou Li-hua, ""Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case"", International Conference on Networks Security, Wireless Communications and Trusted Computing p . 719-723 2009.
|
14 |
Internet Key Exchange Protocol (IKEv2) (RFC4306) http://www.ietf.org/rfc/rfc4306.txt.
|