Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Implementing Internet Key Exchange Previous: Availability

References

1
R. Atkinson.
IP Authentication Header.
RFC 1826, August 1995.

2
R. Atkinson.
IP Encapsulating Security Payload.
RFC 1827, August 1995.

3
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis.
The role of trust management in distributed systems security.
In Secure Internet Programming, volume 1603 of Lecture Notes in Computer Science, pages 185-210. Springer-Verlag Inc., New York, NY, USA, 1999.

4
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis.
The keynote trust management system version 2.
Internet RFC 2704, September 1999.

5
M. Blaze, J. Feigenbaum, and J. Lacy.
Decentralized Trust Management.
In Proc. of the 17th Symposium on Security and Privacy, pages 164-173. IEEE Computer Society Press, Los Alamitos, 1996.

6
M. Blaze, J. Ioannidis, and A. Keromytis.
Trust Management and Network Layer Security Protocols.
In Proceedings of the 1999 Cambridge Security Protocols International Workshop. Springer, 1999.

7
Consultation Committee.
X.509: The Directory Authentication Framework.
International Telephone and Telegraph, International Telecommunications Union, Geneva, 1989.

8
T. de Raadt, N. Hallqvist, A. Grabowski, A. D. Keromytis, and N. Provos.
Cryptography in OpenBSD: An Overview.
In Proc. of the 1999 USENIX Annual Technical Conference, Freenix Track, pages 93 - 101, June 1999.

9
W. Diffie and M.E. Hellman.
New Directions in Cryptography.
IEEE Transactions on Information Theory, IT-22(6):644-654, Nov 1976.

10
D. Eastlake and C. Kaufman.
Dynamic Name Service and Security.
Internet RFC 2065, January 1997.

11
D. Harkins and D. Carrel.
The internet key exchange (IKE).
Request for Comments (Proposed Standard) 2409, Internet Engineering Task Force, November 1998.

12
John Ioannidis and Matt Blaze.
The Architecture and Implementation of Network-Layer Security Under Unix.
In Fourth Usenix Security Symposium Proceedings. USENIX, October 1993.

13
P. Karn and W. Simpson.
Photuris: Session-key management protocol.
Request for Comments (Experimental) 2522, Internet Engineering Task Force, March 1999.

14
S. Kent and R. Atkinson.
Security architecture for the internet protocol.
Request for Comments (Proposed Standard) 2401, Internet Engineering Task Force, November 1998.

15
A. D. Keromytis, J. Ioannidis, and J. M. Smith.
Implementing IPsec.
In Proceedings of Global Internet (GlobeCom) '97, pages 1948 - 1952, November 1997.

16
D. McDonald, C. Metz, and B. Phan.
PF_KEY Key Management API, Version 2.
Request for Comments (Informational) 2367, Internet Engineering Task Force, July 1998.

17
W. A. Simpson.
IKE/ISAKMP Considered Harmful.
USENIX ;login:, December 1999.


Angelos D. Keromytis
4/20/2000