Information Technology Reference
In-Depth Information
18.
Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, IETF, RFC 2401
(1998a)
19.
Kent, S., Atkinson. R.: IP Authentication Header (AH), IETF, RFC 2402 (1998)
20.
Kent, S., Atkinson. R.: IP Encapsulating Security Payload (ESP), IETF, RFC 2406 (1998)
21.
Kivinen, T., Swander, B. Huttunen, A., Volpe, V.: Negotiation of NAT-Traversal in the
IKE, IETF, RFC 3947 (2005)
22.
Maughan, D. Schertler, M., Schneider, M., Turner, J.: Internet Security Association and
Key Management Protocol (ISAKMP), IETF, RFC 2408 (1998)
23.
Montenegro, G., Borella, M.: RSIP Support for End-to-end IPsec, IETF, RFC 3104 (2001)
24.
Phifer, L.: IP Security and NAT: Oil and Water?, ISP-Planet (2000)
25.
Postel, J.: User Datagram Protocol, IETF, RFC 768 (1980)
26.
Postel, J.: Transmission Control Protocol, IETF, RFC 793 (1981)
27.
Postel, J.: INTERNET PROTOCOL, IETF, RFC 791 (1981)
28.
Srisureh, P.: Security Model with Tunnel-mode IPsec for NAT Domains. IETF, RFC 2709
(1999)
29.
Srisureh, P., Holdrege. M.: IP Network Address Translator (NAT) Terminology and Con-
siderations, IETF, RFC 2663 (1999)
30.
Srisureh, P., Egevang. K.: Traditional IP Network Address Translator (traditional NAT),
IETF, RFC 3022 (2001)
31.
Sun Microsystems: System Administration Guide: IP Services [Electronic version],
Part
No:
816-4554-10.
Retrieved
from
docs.sun.com,
Web
site:
http://docs.sun.com/app/docs/doc/816-4554/6maoq020v?a=view (2005)
32.
Demerjian, J., Hajjeh, I., Serhrouchni, A., Badra, M.: Network security using E-DHCP
over NAT/IPsec, In WTAS'05. International Conference on Web Technologies,
Applications and Services. IASTED Conference, Alberta, Canada (2005)
33.
Bozga, L., Lakhnech, Y., Périn, M.. Hermes: A tool verifying secrecy properties of un-
bounded security protocols. In CAV'03. 15th International Conference on Computer-
Aided Verification. Lecture Notes in Computer Science, Springer Verlag, July 2003
(2003)
34.
Herme's tool, url: www-verimag.imag.fr/~Liana.Bozga/eva/hermes.php
35.
French National Projet EVA (Explication et Vérification Automatique pour les Protocoles
Cryptographiques). url : www-eva.imag.fr
36.
Le Metayer, D., Jacquemard, F. : Langage de spécification de protocoles cryptographiques
de EVA : syntaxe concrète. Technical Report EVA-1-v3.17, Trusted Logic, November
2001. Available from http://www-eva.imag.fr