Trusted Information Systems Rfc

CFSD88 Case, J., Fedor, M., Schoffstall, M., and J. Davin, 'Simple Network Management Protocol', rfc 1067, University of Tennessee at Knoxville, NYSERNet, Inc., Rensselaer Polytechnic Institute, Proteon, Inc., August 1988. DH76 Diffie W., and M. Hellman, 'New Directions in Cryptography', ieee Transactions on Information Theory, Volume IT-11, November 1976, pp. 644-654.

GM93 Galvin, J., and K. McCloghrie, 'Security Protocols for Version 2 of the Simple Network Management Protocol (SNMPv2)', rfc 1446, Trusted Information Systems, Hughes lan Systems, April 1993. Haller94 Haller, N., 'The S / Key One-time Password System', Proceedings of the Symposium on Network & Distributed Systems Security, Internet Society, San Diego, ca, February 1994. Kaufman93 Kaufman, C., 'Distributed Authentication Security Service (DASS)', rfc 1507, Digital Equipment Corporation, September 1993. 93 , B., 'Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services', rfc 1424, rsa Laboratories, February 1993. Kantor91 Kantor, B., 'BSD Rlogin', rfc 1258, Univ. of Calif San Diego, September 1991. Kent93 Kent, S., 'Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management', rfc 1422, bbn, iab irtf psrg, ietf pem, February 1993.

KN93 Kohl, J., and C. Neuman, 'The Kerberos Network Authentication Service (V5)', rfc 1510, Digital Equipment Corporation, usc / Information Sciences Institute, September 1993. Linn93 Linn, J., 'Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures', rfc 1421, iab irtf psrg, ietf pem wg, February 1993. Linn93a Linn, J., 'Common Authentication Technology Overview', rfc 1511, Geer Zolot Associate, September 1993. LS92 Lloyd B., and W. Simpson, 'PPP Authentication Protocols', rfc 1334, L & A, Daydreamer, October 1992. LR91 Lougheed K., and Y. , 'A Border Gateway protocol 3 (BGP-3)', rfc 1267, cisco Systems, tj Watson Research Center, ibm Corp., October 1991. Mills92 Mills, D., 'Network Time Protocol (Version 3) – Specification, Implementation, and Analysis', rfc 1305, udel, March 1992. NBS77 National Bureau of Standards, 'Data Encryption Standard', Federal Information Processing Standards Publication 46, Government Printing Office, Washington, dc, 1977. NS78 Needham, R., and M. Schroeder, 'Using Encryption for Authentication in Large Networks of Computers', Communications of the acm, Vol. 21, No. 12, eDecember 1978. NS87 Needham, R., and M. Schroeder, 'Authentication Revisited', acm Operating Systems Review, Vol. 21, No. 1, 1987. PR85 Postel J., and J. Reynolds, 'File Transfer Protocol', std 9, rfc 959, usc / Information Sciences Institute, October 1985. Moy91 Moy, J., 'OSPF Routing Protocol, Version 2', rfc 1247, Proteon, Inc., July 1991. RSA78 Rivest, R., Shamir, A., and L. Adleman, 'A Method for Obtaining Digital Signatures and Public Key Crypto-systems', Communications of the acm, Vol. 21, No. 2, February 1978. Rivest92 Rivest, R., 'The MD5 Message-Digest Algorithm', rfc 1321, mit Laboratory for Computer Science and rsa Data Security, Inc., April 1992. Simpson93 Simpson, W., 'The Point to Point Protocol', rfc 1548, Daydreamer, December 1993. SNS88 Steiner, J., Neuman, C., and J. Schiller, 'Kerberos:' An Authentication Service for Open Network Systems', usenix Conference Proceedings, Dallas, Texas, February 1988. Stoll90 Stoll, C., 'The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage', Pocket Books, New York, ny, 1990. TA91 Tardo J., and K. Alagappan, 'SPX: Global Authentication Using Public Key Certificates', Proceedings of the 1991 Symposium on Research in Security & Privacy, ieee Computer Society, Los Amitos, California, 1991. pp.232-244.