next up previous
Next: Appendix: Specification of the Up: On Searching for Known Previous: Conclusion

References

1
R. Atkinson. IP encapsulating security payload (ESP). Request for Comments (Proposed Standard) RFC 1827, Internet Engineering Task Force, August 1995.

2
R. Atkinson. Security architecture for the internet protocol. Request for Comments (Proposed Standard) RFC 1825, Internet Engineering Task Force, August 1995.

3
S. M. Bellovin, Problem Areas for the IP Security Protocols, Proceedings of the Sixth Usenix UNIX Security Symposium, San Jose, CA, July, 1996.

4
C. Meadows, A System for the Specification and Verification of Key Management Protocols, Proceedings of the 1991 IEEE Computer Society Symposium in Research in Security and Privacy, May 1991.

5
C. Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol, The Journal of Computer Security, 1992:1,1, Jan, 1992.

6
C. Meadows, The NRL Protocol Analyzer: An Overview, J. Logic Programming, 1996:19, 20:1-679, Elsevier Science, New York, NY, 1996.

7
Catherine Meadows, Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches, Computer Security - ESORICS 96, Springer-Verlag, September 1996, pp. 365-364.

8
P. Metzger, P. Karn, and W. Simpson. The ESP DES-CBC transform. Request for Comments (Proposed Standard) RFC 1829, Internet Engineering Task Force, August 1995.

9
S. Stubblebine and V. Gligor, Protocol Design for Integrity Protection, IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, May, 1993, pp. 41-53.

10
S. Stubblebine and V. Gligor, On Message Integrity in Cryptographic Protocols, IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, May, 1992, pp. 85-104.

11
V. L. Voydock and S. T. Kent, Security Mechanisms In High- Level Network Protocols, Computing Surveys, vol. 15, no. 2, June 1983.