scispace - formally typeset
M

M. Schertler

Researcher at United States Department of Defense

Publications -  6
Citations -  932

M. Schertler is an academic researcher from United States Department of Defense. The author has contributed to research in topics: Security information and event management & Security association. The author has an hindex of 5, co-authored 6 publications receiving 925 citations.

Papers
More filters

Internet Security Association and Key Management Protocol (ISAKMP) Status of this Memo

TL;DR: The Internet Security Association and Key Management Protocol (ISAKMP) as discussed by the authors is a key management protocol that allows the creation and management of security associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks).

Internet Security Association and Key Management Protocol (ISAKMP)

TL;DR: A Security Association protocol that negotiates, establishes, modifies and deletes Security Associations and their attributes is required for an evolving Internet, where there will be numerous security mechanisms and several options for each security mechanism.

Identity-Based Encryption Architecture and Supporting Data Structures

TL;DR: This document describes the security architecture required to implement identity-based encryption, a public-key encryption technology that uses a user's identity as a public key and defines data structures that can be used to implement the technology.

Using the Boneh-Franklin and Boneh-Boyen Identity-Based Encryption Algorithms with the Cryptographic Message Syntax (CMS)

TL;DR: The conventions for using the Boneh-Franklin (BF) andBoneh-Boyen (BB1) identity-based encryption algorithms in the Cryptographic Message Syntax (CMS) to encrypt content-encryption keys are described.
Proceedings ArticleDOI

Security associations: building blocks for secure communications

TL;DR: If future global interoperability is to be provided securely one of the first building blocks will be the ability to negotiate and establish security associations, therefore, issues that must be resolved for futureglobal interoperability are discussed.