Information Technology Reference
In-Depth Information
18. Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, IETF, RFC 2401
(1998a)
19. Kent, S., Atkinson. R.: IP Authentication Header (AH), IETF, RFC 2402 (1998)
20. Kent, S., Atkinson. R.: IP Encapsulating Security Payload (ESP), IETF, RFC 2406 (1998)
21. Kivinen, T., Swander, B. Huttunen, A., Volpe, V.: Negotiation of NAT-Traversal in the
IKE, IETF, RFC 3947 (2005)
22. Maughan, D. Schertler, M., Schneider, M., Turner, J.: Internet Security Association and
Key Management Protocol (ISAKMP), IETF, RFC 2408 (1998)
23. Montenegro, G., Borella, M.: RSIP Support for End-to-end IPsec, IETF, RFC 3104 (2001)
24. Phifer, L.: IP Security and NAT: Oil and Water?, ISP-Planet (2000)
25. Postel, J.: User Datagram Protocol, IETF, RFC 768 (1980)
26. Postel, J.: Transmission Control Protocol, IETF, RFC 793 (1981)
27. Postel, J.: INTERNET PROTOCOL, IETF, RFC 791 (1981)
28. Srisureh, P.: Security Model with Tunnel-mode IPsec for NAT Domains. IETF, RFC 2709
(1999)
29. Srisureh, P., Holdrege. M.: IP Network Address Translator (NAT) Terminology and Con-
siderations, IETF, RFC 2663 (1999)
30. Srisureh, P., Egevang. K.: Traditional IP Network Address Translator (traditional NAT),
IETF, RFC 3022 (2001)
31. Sun Microsystems: System Administration Guide: IP Services [Electronic version],
Part
No:
816-4554-10.
Retrieved
from
docs.sun.com,
Web
site:
http://docs.sun.com/app/docs/doc/816-4554/6maoq020v?a=view (2005)
32. Demerjian, J., Hajjeh, I., Serhrouchni, A., Badra, M.: Network security using E-DHCP
over NAT/IPsec, In WTAS'05. International Conference on Web Technologies,
Applications and Services. IASTED Conference, Alberta, Canada (2005)
33. Bozga, L., Lakhnech, Y., Périn, M.. Hermes: A tool verifying secrecy properties of un-
bounded security protocols. In CAV'03. 15th International Conference on Computer-
Aided Verification. Lecture Notes in Computer Science, Springer Verlag, July 2003
(2003)
34. Herme's tool, url: www-verimag.imag.fr/~Liana.Bozga/eva/hermes.php
35. French National Projet EVA (Explication et Vérification Automatique pour les Protocoles
Cryptographiques). url : www-eva.imag.fr
36. Le Metayer, D., Jacquemard, F. : Langage de spécification de protocoles cryptographiques
de EVA : syntaxe concrète. Technical Report EVA-1-v3.17, Trusted Logic, November
2001. Available from http://www-eva.imag.fr
 
Search WWH ::




Custom Search