scispace - formally typeset
Search or ask a question

Showing papers on "IPsec published in 1993"


Book

[...]

01 Jan 1993
TL;DR: Focusing on real-life solutions to real-world problems, this book is the best print source of information on all major changes in the field, including the new IP security standards and the Next Generation Internet Protocol (IPv6).
Abstract: From the Publisher: This benchmark reference is the ultimate manual for planning, configuring, operating, maintaining, and using a TCP/IP network and associated services. Dr. Sidnie Feit's book gives you a clear overview of TCP/IP technology, in-depth coverage of applications, and advice on how to get past performance obstacles. Focusing on real-life solutions to real-world problems, this book is the best print source of information on all major changes in the field, including the new IP security standards and the Next Generation Internet Protocol (IPv6).

66 citations


Journal ArticleDOI
TL;DR: This bibliography contains references of protocol descriptions and of protocol analysis efforts that are fundamental to access control, accounting and secure communication.
Abstract: Security of distributed systems is a topic of growing importance. The security breaches of the last few years (internet worm,...) have demonstrated the need for additional research in this area. One important aspect of security is authentication. It is fundamental to access control, accounting and secure communication. This bibliography contains references of protocol descriptions and of protocol analysis efforts

60 citations


01 Apr 1993
TL;DR: It is the purpose of this document, Security Protocols for SNMPv2, to define one such authentication and one such privacy protocol.
Abstract: It is the purpose of this document, Security Protocols for SNMPv2, to define one such authentication and one such privacy protocol [STANDARDS-TRACK]

36 citations


01 May 1993
TL;DR: This RFC documents an experimental protocol providing a Type of Service (TOS) to request maximum physical link security, consistent with all other defined types of service for IP version 4 in that it is based on link level characteristics and will not provide any particular guaranteed level of service.
Abstract: This RFC documents an experimental protocol providing a Type of Service (TOS) to request maximum physical link security. This is an addition to the types of service enumerated in RFC 1349: Type of Service in the Internet Protocol Suite. The new TOS requests the network to provide what protection it can against surreptitious observation by outside agents of traffic so labeled. The purpose is protection against traffic analysis and as an additional possible level of data confidentiality. This TOS is consistent with all other defined types of service for IP version 4 in that it is based on link level characteristics and will not provide any particular guaranteed level of service.

17 citations


01 Apr 1993
TL;DR: This RFC is a vehicle to inform the Internet community about XTP as it benefits from past Internet activity and targets general-purpose applications and multimedia applications with the emerging ATM networks in mind.
Abstract: The new generation of multimedia applications demands new features and new mechanisms for proper performance. ATM technology has moved from concept to reality, delivering very high bandwidths and new capabilities to the data link layer user. In an effort to anticipate the high bandwidth-delay data link layer, Delta-t [Delta-t], NETBLT [RFC 988], and VMTP [RFC 1045] were developed. The excellent insights and mechanisms pioneered by the creators of these experimental Internet protocols were used in the design of Xpress Transfer Protocol (XTP) [XTP92] with the goal of eventually delivering ATM bandwidths to a user process. This RFC is a vehicle to inform the Internet community about XTP as it benefits from past Internet activity and targets general-purpose applications and multimedia applications with the emerging ATM networks in mind.

8 citations


ReportDOI
05 Aug 1993
TL;DR: An internet work authentication architecture using public key authentication technology is proposed as a possible mechanism to substantially improve the security of large internet works.
Abstract: : Current internet works do not have effective host-to-host authentication mechanisms. The lack of these mechanisms contributes substantially to currently widespread network security problems. Public key authentication is a good approach to providing optional authentication in internet works. An internet work authentication architecture using public key authentication technology is proposed as a possible mechanism to substantially improve the security of large internet works. Limitations of the proposed authentication architecture are also described.... Network, Authentication, Security, Digital signature, Internet