skip to main content
RFC2401: Security Architecture for the Internet Protocol1998 RFC
Bibliometrics
Abstract

No abstract available.

RFC Downloads

Cited By

  1. Bardhi E, Conti M, Lazzeretti R and Losiouk E (2023). Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey, IEEE Communications Surveys & Tutorials, 25:4, (2427-2455), Online publication date: 1-Oct-2023.
  2. ACM
    Crawshaw D (2021). Everything VPN is new again, Communications of the ACM, 64:4, (130-134), Online publication date: 1-Apr-2021.
  3. ACM
    Biham E, Bitan S and Dankner A K7: A Protected Protocol for Industrial Control Systems that Fits Large Organizations Sixth Annual Industrial Control System Security (ICSS) Workshop, (1-12)
  4. ACM
    Pu H, He L, Zhao C, Yau D, Cheng P and Chen J Detecting replay attacks against industrial robots via power fingerprinting Proceedings of the 18th Conference on Embedded Networked Sensor Systems, (285-297)
  5. Simpson A, Szekeres A, Nelson J and Zhang I Securing RDMA for high-performance datacenter storage systems Proceedings of the 12th USENIX Conference on Hot Topics in Cloud Computing, (11-11)
  6. Perez-Resa A, Garcia-Bosque M, Sanchez-Azqueta C and Celma S (2019). Self-Synchronized Encryption for Physical Layer in 10Gbps Optical Links, IEEE Transactions on Computers, 68:6, (899-911), Online publication date: 1-Jun-2019.
  7. Elamathi N, Jayashri S and Pitchai R (2019). Enhanced secure communication over inter-domain routing in heterogeneous wireless networks based on analysis of BGP anomalies using soft computing techniques, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:8, (2735-2746), Online publication date: 1-Apr-2019.
  8. Krzywiecki Ł, Kluczniak K, Kozieł P and Panwar N (2018). Privacy-oriented dependency via deniable SIGMA protocol, Computers and Security, 79:C, (53-67), Online publication date: 1-Nov-2018.
  9. Lavanya M and Natarajan V (2017). Lightweight key agreement protocol for IoT based on IKEv2, Computers and Electrical Engineering, 64:C, (580-594), Online publication date: 1-Nov-2017.
  10. Irshad A, Kumari S, Li X, Wu F, Chaudhry S and Arshad H (2017). An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification, Wireless Personal Communications: An International Journal, 97:2, (2145-2166), Online publication date: 1-Nov-2017.
  11. Rao M, Newe T, Grout I and Mathur A (2016). An FPGA-based reconfigurable IPSec AH core with efficient implementation of SHA-3 for high speed IoT applications, Security and Communication Networks, 9:16, (3282-3295), Online publication date: 10-Nov-2016.
  12. ACM
    Park J, Jung W, Jo G, Lee I and Lee J PIPSEA Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1255-1267)
  13. Paul R, Chakrabarti A and Ghosh R (2016). Multi core SSL/TLS security processor architecture and its FPGA prototype design with automated preferential algorithm, Microprocessors & Microsystems, 40:C, (124-136), Online publication date: 1-Feb-2016.
  14. ACM
    Zhong X, Arunagirinathan P, Ahmadi A, Brooks R and Venayagamoorthy G Side-Channels in Electric Power Synchrophasor Network Data Traffic Proceedings of the 10th Annual Cyber and Information Security Research Conference, (1-8)
  15. Siddiqui M, Montero D, Serral-Gracià R, Masip-Bruin X and Yannuzzi M (2015). A survey on the recent efforts of the Internet Standardization Body for securing inter-domain routing, Computer Networks: The International Journal of Computer and Telecommunications Networking, 80:C, (1-26), Online publication date: 7-Apr-2015.
  16. Kirstein P and Varakliotis S Handling the internet of things with care Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, (287-294)
  17. Fontes R, Oliveira A, Sampaio P, Pinheiro T and Figueira R Authoring of OpenFlow networks with visual network description (SDN version) (WIP) Proceedings of the 2014 Summer Simulation Multiconference, (1-6)
  18. ACM
    AlSabah M and Goldberg I PCTCP Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (349-360)
  19. Soni A, Keoh S, Kumar S and Garcia-Morchon O HADA Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research 2013, (1-11)
  20. Correia M, Neves N and Verissimo P (2013). BFT-TO, The Computer Journal, 56:6, (693-715), Online publication date: 1-Jun-2013.
  21. Cabellos-Aparicio A, Cioran D, Barlet-Ros P, Domingo-Pascual J and Dobrota V (2012). fHA, Information Sciences: an International Journal, 211, (68-80), Online publication date: 1-Nov-2012.
  22. Maachaoui M, Abou El Kalam A, Fraboul C and Ait Ouahman A Multi-level authentication based single sign-on for IMS services Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security, (174-187)
  23. El Kalam A, Maachaoui M, Idboufker N, Lahcen H and Ouahman A (2012). A Secure Architecture for Nomadic User in IMS Network, International Journal of Mobile Computing and Multimedia Communications, 4:1, (1-17), Online publication date: 1-Jan-2012.
  24. ACM
    Haas J, Hu Y and Laurenti N Low-cost mitigation of privacy loss due to radiometric identification Proceedings of the Eighth ACM international workshop on Vehicular inter-networking, (31-40)
  25. Walker J and Li J Key exchange with anonymous authentication using DAA-SIGMA protocol Proceedings of the Second international conference on Trusted Systems, (108-127)
  26. Bente I, Hellmann B, Vieweg J, von Helden J and Welzel A Interoperable remote attestation for VPN environments Proceedings of the Second international conference on Trusted Systems, (302-315)
  27. ACM
    Diesburg S and Wang A (2010). A survey of confidential data storage and deletion methods, ACM Computing Surveys, 43:1, (1-37), Online publication date: 1-Nov-2010.
  28. ACM
    Degabriele J and Paterson K On the (in)security of IPsec in MAC-then-encrypt configurations Proceedings of the 17th ACM conference on Computer and communications security, (493-504)
  29. Acharya H and Gouda M On the power of non-spoofing adversaries Proceedings of the 24th international conference on Distributed computing, (437-449)
  30. Zhang R, Wang X, Yang X and Jiang X (2010). On the billing vulnerabilities of SIP-based VoIP systems, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:11, (1837-1847), Online publication date: 1-Aug-2010.
  31. Zhang G, Pallares J, Rebahi Y and Fischer-Hübner S SIP proxies Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security, (142-153)
  32. ACM
    Huang T, Zeadally S, Chilamkurti N and Shieh C (2010). A programmable network address translator, ACM Transactions on Internet Technology, 10:1, (1-37), Online publication date: 1-Feb-2010.
  33. Liao Y and Wang S (2010). A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves, Computer Communications, 33:3, (372-380), Online publication date: 1-Feb-2010.
  34. Mostafa M, Abou El Kalam A and Fraboul C Q-ESP Proceedings of the 3rd international conference on New technologies, mobility and security, (228-233)
  35. ACM
    Goodloe A and Gunter C Completeness of discovery protocols Proceedings of the 2nd ACM workshop on Assurable and usable security configuration, (29-36)
  36. Huang T, Zeadally S, Chilamkurti N and Shieh C (2009). Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks, Journal of Network and Computer Applications, 32:3, (741-759), Online publication date: 1-May-2009.
  37. ACM
    Manulis M, Leroy D, Koeune F, Bonaventure O and Quisquater J Authenticated wireless roaming via tunnels Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (92-103)
  38. Won J, Vadapalli M, Cho C and Leung V (2009). Secure media independent handover message transport in heterogeneous networks, EURASIP Journal on Wireless Communications and Networking, 2009, (1-15), Online publication date: 1-Feb-2009.
  39. ACM
    Andersen D, Balakrishnan H, Feamster N, Koponen T, Moon D and Shenker S (2008). Accountable internet protocol (aip), ACM SIGCOMM Computer Communication Review, 38:4, (339-350), Online publication date: 1-Oct-2008.
  40. ACM
    Wang X, Zhang R, Yang X, Jiang X and Wijesekera D Voice pharming attack and the trust of VoIP Proceedings of the 4th international conference on Security and privacy in communication netowrks, (1-11)
  41. ACM
    Allard F, Combes J, Bonnin J and Bournelle J IKE context transfer in an IPv6 mobility environment Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture, (55-60)
  42. ACM
    Andersen D, Balakrishnan H, Feamster N, Koponen T, Moon D and Shenker S Accountable internet protocol (aip) Proceedings of the ACM SIGCOMM 2008 conference on Data communication, (339-350)
  43. Wang N, Chen J, Huang Y and Chan T (2008). An IPSec-based key management algorithm for mobile IP networks, WSEAS TRANSACTIONS on COMMUNICATIONS, 7:8, (892-901), Online publication date: 1-Aug-2008.
  44. ACM
    Miltchev S, Smith J, Prevelakis V, Keromytis A and Ioannidis S (2008). Decentralized access control in distributed file systems, ACM Computing Surveys, 40:3, (1-30), Online publication date: 1-Aug-2008.
  45. ACM
    Srivatsa M, Iyengar A, Yin J and Liu L (2008). Mitigating application-level denial of service attacks on Web servers, ACM Transactions on the Web, 2:3, (1-49), Online publication date: 1-Jul-2008.
  46. Omar H, Chamas H and Shuaib K A network based approach to secure communication in mobile IP networks Proceedings of the Eighth IASTED International Conference on Wireless and Optical Communications, (64-69)
  47. Mendez A, Ruiz P, Lopez R, Perez G, Skarmeta A and Taniuchi K (2008). OpenIKEv2, IEICE - Transactions on Information and Systems, E91-D:5, (1319-1329), Online publication date: 1-May-2008.
  48. Rikitake K, Nakao K, Shimojo S and Nogawa H (2008). UDP Large-Payload Capability Detection for DNSSEC, IEICE - Transactions on Information and Systems, E91-D:5, (1261-1273), Online publication date: 1-May-2008.
  49. Amer S and Hamilton J Understanding security architecture Proceedings of the 2008 Spring simulation multiconference, (335-342)
  50. ACM
    Murray D, Milos G and Hand S Improving Xen security through disaggregation Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, (151-160)
  51. Gogniat G, Wolf T, Burleson W, Diguet J, Bossuet L and Vaslin R (2008). Reconfigurable hardware for high-security/high-performance embedded systems, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16:2, (144-154), Online publication date: 1-Feb-2008.
  52. Sadeghi A Trusted computing Proceedings of the 34th conference on Current trends in theory and practice of computer science, (98-117)
  53. Chen Y, Hwang K and Ku. W (2007). Collaborative Detection of DDoS Attacks over Multiple Network Domains, IEEE Transactions on Parallel and Distributed Systems, 18:12, (1649-1662), Online publication date: 1-Dec-2007.
  54. Kim J, Kim Z and Kim K A lightweight privacy preserving authentication and access control scheme for ubiquitous computing environment Proceedings of the 10th international conference on Information security and cryptology, (37-48)
  55. Niculescu M, Niculescu E and Resceanu I Mobile IP security and scalable support for transparent host mobility on the internet Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7, (214-221)
  56. ACM
    Gasmi Y, Sadeghi A, Stewin P, Unger M and Asokan N Beyond secure channels Proceedings of the 2007 ACM workshop on Scalable trusted computing, (30-40)
  57. Jørstad I and Thanh D (2007). Personalised ubiquitous file access with XML Web Services, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51:16, (4655-4668), Online publication date: 1-Nov-2007.
  58. ACM
    Ford B (2007). Structured streams, ACM SIGCOMM Computer Communication Review, 37:4, (361-372), Online publication date: 1-Oct-2007.
  59. ACM
    Cai K, Blackstock M, Lotun R, Feeley M, Krasic C and Wang J Wireless unfairness Proceedings of the second ACM international workshop on Wireless network testbeds, experimental evaluation and characterization, (43-50)
  60. Sakamoto C, De Marco G, Yaegashi R, Tadauchi M and Barolli L SKEMON Proceedings of the 1st international conference on Network-based information systems, (108-117)
  61. Brännström R, Åhlund C, Andersson K and Granlund D (2007). Multimedia flow mobility in heterogeneous networks using multihomed mobile IP, Journal of Mobile Multimedia, 3:3, (218-234), Online publication date: 1-Sep-2007.
  62. Bohacek S, Hespanha J, Lee J, Lim C and Obraczka K (2007). Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networks, IEEE Transactions on Parallel and Distributed Systems, 18:9, (1227-1240), Online publication date: 1-Sep-2007.
  63. ACM
    Kharrazi M, Sen S and Spatscheck O Towards real-time performance monitoring for encrypted traffic Proceedings of the 2007 SIGCOMM workshop on Internet network management, (287-292)
  64. ACM
    Ford B Structured streams Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (361-372)
  65. Zhang R, Wang X, Yang X and Jiang X Billing attacks on SIP-based VoIP systems Proceedings of the first USENIX workshop on Offensive Technologies, (1-8)
  66. Cristea M, Gommans L, Xu L and Bos H The token based switch Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (945-957)
  67. Cabellos-Aparicio A and Domingo-Pascual J A flexible and distributed home agent architecture for mobile IPv6-based networks Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (333-344)
  68. Simon D, Agarwal S and Maltz D AS-based accountability as a cost-effective DDoS defense Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, (9-9)
  69. ACM
    Ansari F and Sathyanath A (2007). STEM, ACM SIGMOBILE Mobile Computing and Communications Review, 11:2, (1-13), Online publication date: 1-Apr-2007.
  70. Tantayakul K, Elz R, Kamolphiwong S and Angchuan T Mobility mechanism between MIPv4 and MIPv6 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks, (196-201)
  71. ACM
    Wang P, Ning P and Reeves D A k-anonymous communication protocol for overlay networks Proceedings of the 2nd ACM symposium on Information, computer and communications security, (45-56)
  72. Lee J and Chung T (2007). Performance evaluation of distributed multiple home agents with HAHA protocol, International Journal of Network Management, 17:2, (107-115), Online publication date: 1-Mar-2007.
  73. Akhlaq M, Jafri M, Khan M and Aslam B Data security key establishment in AODV Proceedings of the 6th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications, (181-186)
  74. Akhlaq M, Jafri M, Khan M and Aslam B Data security key establishment in AODV Proceedings of the 6th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications, (181-186)
  75. Guha R, Gunter C and Sarkar S (2007). Fair Coalitions for Power-Aware Routing in Wireless Networks, IEEE Transactions on Mobile Computing, 6:2, (206-220), Online publication date: 1-Feb-2007.
  76. Puongmanee M, Elz R, Kamolphiwong S, Kamolphiwong T, Jantaraprim C and Angchuan T NAT-PT with multicast Proceedings of the Second Asian international conference on Technologies for Advanced Heterogeneous Networks, (90-102)
  77. Srivatsa M, Iyengar A, Yin J and Liu L A middleware system for protecting against application level denial of service attacks Proceedings of the 7th ACM/IFIP/USENIX international conference on Middleware, (260-280)
  78. Srivatsa M, Iyengar A, Yin J and Liu L A middleware system for protecting against application level denial of service attacks Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware, (260-280)
  79. Merino P, García-Martínez A, Organero M and Kloos C Enabling practical IPsec authentication for the internet Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (392-403)
  80. Chen K, Liu Y, Liu T and Dow C ZERO-conflict Proceedings of the 17th IFIP/IEEE international conference on Distributed Systems: operations and management, (197-208)
  81. Martínez Pérez G, López Millán G, García Clemente F and Gómez Skarmeta A (2006). Dynamic and secure management of VPNs in IPv6 multi-domain scenarios, Computer Communications, 29:16, (3122-3134), Online publication date: 1-Oct-2006.
  82. Li M and Feng H Chaotically masking traffic pattern to prevent traffic pattern analysis attacks for mission critical applications in computer communication networks Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II, (448-451)
  83. Khattab S, Melhem R, Mossé D and Znati T (2006). Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks, Journal of Parallel and Distributed Computing, 66:9, (1152-1164), Online publication date: 1-Sep-2006.
  84. Martínez-Manzano D, López G and Gómez-Skarmeta A Multidomain virtual security negotiation over the session initiation protocol (SIP) Proceedings of the First international conference on Critical Information Infrastructures Security, (249-261)
  85. Tschofenig H and Fu X (2006). Securing the Next Steps In Signalling (NSIS) protocol suite, International Journal of Internet Protocol Technology, 1:4, (271-282), Online publication date: 1-Aug-2006.
  86. ACM
    Wang C, Lo C, Lee M, Yeh J, Huang C, Wu C and Huang S A network security processor design based on an integrated SOC design and test platform Proceedings of the 43rd annual Design Automation Conference, (490-495)
  87. Jahnke M, Tölle J, Lettgen S, Bussmann M and Weddige U A robust SNMP based infrastructure for intrusion detection and response in tactical MANETs Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment, (164-180)
  88. ACM
    Bassil C, Serhrouchni A and Rouhana N Simple voice security protocol Proceedings of the 2006 international conference on Wireless communications and mobile computing, (367-372)
  89. ACM
    Wang C, Yu C, Liang C, Yu K, Ouyang W, Hsu C and Chen Y Tracers placement for IP traceback against DDoS attacks Proceedings of the 2006 international conference on Wireless communications and mobile computing, (355-360)
  90. Solis J and Tsudik G Simple and flexible revocation checking with privacy Proceedings of the 6th international conference on Privacy Enhancing Technologies, (351-367)
  91. Chen J, Liang J, Wang S, Pan S, Chen Y and Chen Y Fast Handoff in Mobile Virtual Private Networks Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, (548-552)
  92. ACM
    Bahl P, Chandra R, Padhye J, Ravindranath L, Singh M, Wolman A and Zill B Enhancing the security of corporate Wi-Fi networks using DAIR Proceedings of the 4th international conference on Mobile systems, applications and services, (1-14)
  93. Pala M and Lioy A Fighting e-mail abuses Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice, (130-144)
  94. Paterson K and Yau A Cryptography in theory and practice Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, (12-29)
  95. Kang N and Kim Y A short-lived key selection approach to authenticate data origin of multimedia stream Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III, (497-506)
  96. Ma S, Han J and Wang Z Block-Level storage security architectures Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I, (1010-1018)
  97. Bhatti R, Bertino E and Ghafoor A (2006). X-FEDERATE, IEEE Transactions on Software Engineering, 32:5, (330-346), Online publication date: 1-May-2006.
  98. Paterson K and Yau A (2006). Lost in Translation, IEEE Security and Privacy, 4:3, (69-72), Online publication date: 1-May-2006.
  99. Yogender P and Ali H Impact of employing different security levels on QoS parameters in virtual private networks Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks, (142-149)
  100. Masuda S, Suzuki H, Okazaki N and Watanabe A Proposal for a practical cipher communication protocol that can coexist with NAT and firewalls Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks, (713-722)
  101. Varadharajan V Authorization and trust enhanced security for distributed applications Proceedings of the First international conference on Information Systems Security, (1-20)
  102. Tsai P, Huang C, Huang Y, Hsu C and Lei C A clustering and traffic-redistribution scheme for high-performance IPsec VPNs Proceedings of the 12th international conference on High Performance Computing, (432-443)
  103. Kang H and Mun Y Authentication in fast handover of mobile IPv6 applying AAA by using hash value Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (815-824)
  104. ACM
    Kher V and Kim Y Securing distributed storage Proceedings of the 2005 ACM workshop on Storage security and survivability, (9-25)
  105. Norden S (2005). Inter-domain routing, Computer Networks: The International Journal of Computer and Telecommunications Networking, 49:4, (593-619), Online publication date: 1-Nov-2005.
  106. Ciarletta L and Choi M Automatic configuration for VPN using active XML Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks, (173-180)
  107. Duflos S, Gay V, Kervella B and Horlait E Improving the SLA-Based management of qos for secure multimedia services Proceedings of the 8th international conference on Management of Multimedia Networks and Services, (204-215)
  108. Chang C, Chiu Y and Lei C Automatic generation of conflict-free IPsec policies Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (233-246)
  109. Demerjian J, Hajjeh I, Badra M and Ferraz S A secure way to combine IPsec, NAT & DHCP Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (104-118)
  110. Jung S, Choi J, Kim Y and Kim S IPSec support in NAT-PT scenario for IPv6 transition Proceedings of the 8th international conference on Information Security, (194-202)
  111. ACM
    Køien G Privacy enhanced cellular access security Proceedings of the 4th ACM workshop on Wireless security, (57-66)
  112. Yin H and Wang H Building an application-aware IPsec policy system Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, (21-21)
  113. Kamoun F VoIP networks for carriers and service providers Proceedings of the 9th WSEAS International Conference on Communications, (1-6)
  114. Gilaberte R and Herrero L IP addresses configuration in spontaneous networks Proceedings of the 9th WSEAS International Conference on Computers, (1-6)
  115. Chevul S, Isaksson L, Fiedler M and Lindberg P Measurement of application-perceived throughput of an e2e VPN connection using a GPRS network Proceedings of the Second international conference on Wireless Systems and Network Architectures in Next Generation Internet, (255-268)
  116. Allman M, Blanton E and Paxson V An architecture for developing behavioral history Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop, (7-7)
  117. Tschofenig H, Gurtov A, Ylitalo J, Nagarajan A and Shanmugam M Traversing middleboxes with the host identity protocol Proceedings of the 10th Australasian conference on Information Security and Privacy, (17-28)
  118. ACM
    Schütz S, Eggert L, Schmid S and Brunner M (2005). Protocol enhancements for intermittently connected hosts, ACM SIGCOMM Computer Communication Review, 35:3, (5-18), Online publication date: 1-Jul-2005.
  119. Chanda A, Elmeleegy K, Cox A and Zwaenepoel W Causeway Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10, (18-18)
  120. Køien G and Oleshchuk V Location privacy for cellular systems; analysis and solution Proceedings of the 5th international conference on Privacy Enhancing Technologies, (40-58)
  121. Lucena N, Lewandowski G and Chapin S Covert channels in IPv6 Proceedings of the 5th international conference on Privacy Enhancing Technologies, (147-166)
  122. Lindskog S, Grinnemo K and Brunstrom A Data protection based on physical separation Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (1331-1340)
  123. ACM
    Ferrante A, Piuri V and Castanier F A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems Proceedings of the 2nd conference on Computing frontiers, (221-229)
  124. Mano C and Striegel A Trusted security devices for bandwidth conservation in IPSec environments Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (166-177)
  125. Rhee Y Secure initialization vector transmission on IP security Proceedings of the 4th international conference on Networking - Volume Part II, (852-858)
  126. Bassil C, Serhrouchni A and Rouhana N Critical analysis and new perspective for securing voice networks Proceedings of the 4th international conference on Networking - Volume Part II, (810-818)
  127. Cvrk L, Zeman V and Komosny D H.323 client-independent security approach Proceedings of the 4th international conference on Networking - Volume Part II, (673-680)
  128. Gabrijelčič D, Blaič B and Tasič J (2005). Future active Ip networks security architecture, Computer Communications, 28:6, (688-701), Online publication date: 1-Apr-2005.
  129. Kwon H, Nah J and Chung K A rule-based approach to security test automation on network layer Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics, (1-7)
  130. Fan Z and Subramani S (2005). An address autoconfiguration protocol for IPv6 hosts in a mobile ad hoc network, Computer Communications, 28:4, (339-350), Online publication date: 1-Mar-2005.
  131. Yau D, Lui J, Liang F and Yam Y (2005). Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles, IEEE/ACM Transactions on Networking, 13:1, (29-42), Online publication date: 1-Feb-2005.
  132. Kang N and Ruland C MDS Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking, (824-834)
  133. Chang C, Lu Y, Pang A and Kuo T Design and implementation of SIP security Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking, (669-678)
  134. Lee K and Choi H Bidirectional FSL3/4 on NEDIA (flow separation by layer 3/4 on network environment using dual IP addresses) Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking, (619-626)
  135. ACM
    Goodloe A, Gunter C and Stehr M Formal prototyping in early stages of protocol design Proceedings of the 2005 workshop on Issues in the theory of security, (67-80)
  136. Krishnan R, Sterbenz J, Eddy W, Partridge C and Allman M (2004). Explicit transport error notification (ETEN) for error-prone wireless and satellite networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 46:3, (343-362), Online publication date: 22-Oct-2004.
  137. ACM
    Eddy W, Ostermann S and Allman M (2004). New techniques for making transport protocols robust to corruption-based loss, ACM SIGCOMM Computer Communication Review, 34:5, (75-88), Online publication date: 15-Oct-2004.
  138. Park S, Nah J and Chung K The implementation of IPsec-Based internet security system in IPv4/IPv6 network Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems, (109-116)
  139. ACM
    Hu Y, Perrig A and Sirbu M (2004). SPV, ACM SIGCOMM Computer Communication Review, 34:4, (179-192), Online publication date: 30-Aug-2004.
  140. ACM
    Ahlgren B, Brunner M, Eggert L, Hancock R and Schmid S Invariants Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (65-70)
  141. ACM
    Hu Y, Perrig A and Sirbu M SPV Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (179-192)
  142. Hong K, Jung S, Lo Iacono L and Ruland C Impacts of security protocols on real-time multimedia communications Proceedings of the 5th international conference on Information Security Applications, (1-13)
  143. ACM
    Wollinger T, Guajardo J and Paar C (2004). Security on FPGAs, ACM Transactions on Embedded Computing Systems, 3:3, (534-574), Online publication date: 1-Aug-2004.
  144. ACM
    Wollinger T, Pelzl J, Wittelsberger V, Paar C, Saldamli G and Koç Ç (2004). Elliptic and hyperelliptic curves on embedded μP, ACM Transactions on Embedded Computing Systems, 3:3, (509-533), Online publication date: 1-Aug-2004.
  145. Trostle J, Matsuoka H, Tariq M, Kempf J, Kawahara T and Jain R Cryptographically protected prefixes for location privacy in IPv6 Proceedings of the 4th international conference on Privacy Enhancing Technologies, (142-166)
  146. Aura T and Zugenmaier A Privacy, control and internet mobility Proceedings of the 12th international conference on Security Protocols, (133-145)
  147. Liu D, Chi C and Li M Normalizing Traffic Pattern with Anonymity for Mission Critical Applications Proceedings of the 37th annual symposium on Simulation
  148. Stergiou T, Leeson M and Green R (2004). An alternative architectural framework to the OSI security model, Computers and Security, 23:2, (137-153), Online publication date: 1-Mar-2004.
  149. Kanda M, Miyazawa K and Esaki H USAGI IPv6 IPsec Development for Linux Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
  150. Matalgah M, Qaddour J, Elkeelany O and Sheikh K Portability architecture for nomadic wireless internet access users and security performance evaluation Wireless communications systems and networks, (319-357)
  151. ACM
    Ford B (2004). Unmanaged Internet Protocol, ACM SIGCOMM Computer Communication Review, 34:1, (93-98), Online publication date: 1-Jan-2004.
  152. Francis P (2003). Is the Internet Going NUTSS?, IEEE Internet Computing, 7:6, (96-95), Online publication date: 1-Nov-2003.
  153. ACM
    Huang H and Wu S An approach to certificate path discovery in mobile Ad Hoc networks Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, (41-52)
  154. ACM
    Keromytis A, Parekh J, Gross P, Kaiser G, Misra V, Nieh J, Rubenstein D and Stolfo S A holistic approach to service survivability Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security, (11-22)
  155. ACM
    Venugopalan R, Ganesan P, Peddabachagari P, Dean A, Mueller F and Sichitiu M Encryption overhead in embedded systems and sensor network nodes Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems, (188-197)
  156. ACM
    Wang X and Reeves D Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays Proceedings of the 10th ACM conference on Computer and communications security, (20-29)
  157. ACM
    Morein W, Stavrou A, Cook D, Keromytis A, Misra V and Rubenstein D Using graphic turing tests to counter automated DDoS attacks against web servers Proceedings of the 10th ACM conference on Computer and communications security, (8-19)
  158. ACM
    Clark D, Braden R, Falk A and Pingali V (2003). FARA, ACM SIGCOMM Computer Communication Review, 33:4, (313-321), Online publication date: 1-Oct-2003.
  159. ACM
    Gurtov A and Ludwig R (2003). Lifetime packet discard for efficient real-time transport over cellular links, ACM SIGMOBILE Mobile Computing and Communications Review, 7:4, (32-45), Online publication date: 1-Oct-2003.
  160. Lim J, Yu J and Kim J A study of the method of providing secure network channel among secure OSs Proceedings of the 1st international symposium on Information and communication technologies, (345-350)
  161. ACM
    Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F and Sichitiu M Analyzing and modeling encryption overhead for sensor network nodes Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, (151-159)
  162. ACM
    Buddhikot M, Hari A, Singh K and Miller S MobileNAT Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (75-84)
  163. ACM
    Kasera S, Mizikovsky S, Sundaram G and Woo T On securely enabling intermediary-based services and performance enhancements for wireless mobile users Proceedings of the 2nd ACM workshop on Wireless security, (61-68)
  164. ACM
    Kong J, Das S, Tsai E and Gerla M ESCORT Proceedings of the 2nd ACM workshop on Wireless security, (51-60)
  165. ACM
    Papadimitratos P and Haas Z Secure data transmission in mobile ad hoc networks Proceedings of the 2nd ACM workshop on Wireless security, (41-50)
  166. Leffler S Fast IPsec Proceedings of the BSD Conference 2003 on BSD Conference, (14-14)
  167. Keromytis A Tagging data in the network stack Proceedings of the BSD Conference 2003 on BSD Conference, (13-13)
  168. Leffler S Cryptographic device support for FreeBSD Proceedings of the BSD Conference 2003 on BSD Conference, (8-8)
  169. ACM
    Clark D, Braden R, Falk A and Pingali V FARA Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (313-321)
  170. ACM
    Ramaswamy R, Weng N and Wolf T Considering processing cost in network simulations Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research, (47-56)
  171. ACM
    Callaghan B, Lingutla-Raj T, Chiu A, Staubach P and Asad O NFS over RDMA Proceedings of the ACM SIGCOMM workshop on Network-I/O convergence: experience, lessons, implications, (196-208)
  172. Kim S, Shin J, Sim S and Park D New mechanisms for end-to-end security using IPSec in NAT-based private networks Proceedings of the 2nd international conference on Human.society@internet, (548-557)
  173. Park J, Jin M and Chae K Secure firewall traversal in mobile IP network Proceedings of the 2003 international conference on Computational science, (535-544)
  174. Blaze M, Ioannidis J and Keromytis A Experience with the keynote trust management system Proceedings of the 1st international conference on Trust management, (284-300)
  175. Sherman A and McGrew D (2003). Key Establishment in Large Dynamic Groups Using One-Way Function Trees, IEEE Transactions on Software Engineering, 29:5, (444-458), Online publication date: 1-May-2003.
  176. Skarmeta A, Pérez G, Reverte Ó and Millán G (2003). PKI Services for IPv6, IEEE Internet Computing, 7:3, (36-42), Online publication date: 1-May-2003.
  177. Metz C (2003). Guest Editor's Introduction, IEEE Internet Computing, 7:3, (25-26), Online publication date: 1-May-2003.
  178. Azagury A, Dreizin V, Factor M, Henis E, Naor D, Rinetzky N, Rodeh O, Satran J, Tavory A and Yerushalmi L Towards an Object Store Proceedings of the 20 th IEEE/11 th NASA Goddard Conference on Mass Storage Systems and Technologies (MSS'03)
  179. Grecas C, Maniatis S and Venieris I (2003). Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration, Mobile Networks and Applications, 8:2, (145-150), Online publication date: 1-Apr-2003.
  180. Luo H, Jiang Z, Kim B, Shankaranarayanan N and Henry P (2003). Integrating Wireless LAN and Cellular Data for the Enterprise, IEEE Internet Computing, 7:2, (25-33), Online publication date: 1-Mar-2003.
  181. Xu J and Lee W (2003). Sustaining Availability of Web Services under Distributed Denial of Service Attacks, IEEE Transactions on Computers, 52:2, (195-208), Online publication date: 1-Feb-2003.
  182. Hiltunen M, Schlichting R and Ugarte C (2003). Building Survivable Services Using Redundancy and Adaptation, IEEE Transactions on Computers, 52:2, (181-194), Online publication date: 1-Feb-2003.
  183. Gómez A, Martínez G and Cánovas Ó (2003). New security services based on PKI, Future Generation Computer Systems, 19:2, (251-262), Online publication date: 1-Feb-2003.
  184. Hajjeh I, Serhrouchni A and Tastet F New key management protocol for SSL/TLS Network control and engineering for Qos, security and mobility II, (251-262)
  185. ACM
    Padmanabhan V and Simon D (2003). Secure traceroute to detect faulty or malicious routing, ACM SIGCOMM Computer Communication Review, 33:1, (77-82), Online publication date: 1-Jan-2003.
  186. ACM
    Duflos S, Kervella B and Horlait E An architecture for policy-based security management for distributed multimedia services Proceedings of the tenth ACM international conference on Multimedia, (653-655)
  187. ACM
    Varshney U (2002). Multicast over wireless networks, Communications of the ACM, 45:12, (31-37), Online publication date: 1-Dec-2002.
  188. Sella Y Speeding up secure sessions establishment on the internet Proceedings of the 5th international conference on Information security and cryptology, (433-450)
  189. ACM
    Bellovin S A technique for counting natted hosts Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (267-272)
  190. Yoo S and Kim H Analysis and design of secure and reliable transmission protocol in diameter Proceedings of the 7th CDMA international conference on Mobile communications, (231-238)
  191. Papaioannou T and Stamoulis G Design and implementation of a charging and accounting architecture for QoS-differentiated VPN services to mobile users Proceedings of the 3rd international conference on quality of future internet services and internet charging and QoS technologies 2nd international conference on From QoS provisioning to QoS charging, (250-262)
  192. ACM
    Keromytis A, Misra V and Rubenstein D (2002). SOS, ACM SIGCOMM Computer Communication Review, 32:4, (61-72), Online publication date: 1-Oct-2002.
  193. ACM
    Faria D and Cheriton D DoS and authentication in wireless public access networks Proceedings of the 1st ACM workshop on Wireless security, (47-56)
  194. Tsudik G Weak forward security in mediated RSA Proceedings of the 3rd international conference on Security in communication networks, (45-54)
  195. ACM
    Keromytis A, Misra V and Rubenstein D SOS Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, (61-72)
  196. Kumar A, Rastogi R, Silberschatz A and Yener B (2002). Algorithms for provisioning virtual private networks in the hose model, IEEE/ACM Transactions on Networking, 10:4, (565-578), Online publication date: 1-Aug-2002.
  197. Miltchev S, Ioannidis S and Keromytis A A Study of the Relative Costs of Network Security Protocols Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, (41-48)
  198. ACM
    Zapata M (2002). Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mobile Computing and Communications Review, 6:3, (106-107), Online publication date: 1-Jun-2002.
  199. Riedel E, Kallahalla M and Swaminathan R A Framework for Evaluating Storage System Security Proceedings of the 1st USENIX Conference on File and Storage Technologies, (2-es)
  200. Elkins A, Wilson J and Gracanin D Security issues in high level architecture based distributed simulation Proceedings of the 33nd conference on Winter simulation, (818-826)
  201. Schmid S, Finney J, Wu M, Friday A, Scott A and Shepherd W An Access Control Architecture for Microcellular Wireless IPv6 Networks Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
  202. ACM
    Luckie M, McGregor A and Braun H Towards improving packet probing techniques Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (145-150)
  203. ACM
    Hollick M Security awareness in service discovery for multimedia collaboration Proceedings of the 2001 workshop on Multimedia and security: new challenges, (60-63)
  204. ACM
    Kumar A, Rastogi R, Silberschatz A and Yener B (2001). Algorithms for provisioning virtual private networks in the hose model, ACM SIGCOMM Computer Communication Review, 31:4, (135-146), Online publication date: 1-Oct-2001.
  205. ACM
    Jetcheva J and Johnson D Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, (33-44)
  206. ACM
    Kumar A, Rastogi R, Silberschatz A and Yener B Algorithms for provisioning virtual private networks in the hose model Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, (135-146)
  207. Gleitz P and Bellovin S Transient addressing for related processes Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  208. ACM
    Borisov N, Goldberg I and Wagner D Intercepting mobile communications Proceedings of the 7th annual international conference on Mobile computing and networking, (180-189)
  209. Hiltunen M, Schlichting R and Ugarte C Enhancing Survivability of Security Services Using Redundanc Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS), (173-182)
  210. Metz C (2001). Layer 2 over IP/MPLS, IEEE Internet Computing, 5:4, (77-82), Online publication date: 1-Jul-2001.
  211. Hardjono T, Baugher M and Harney H Group security association (GSA) management in IP multicast Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (213-228)
  212. Park J, Kang M and Froscher J A secure workflow system for dynamic collaboration Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (167-181)
  213. Kato O and Homma K (2001). Overview on Technical Issues for Future Mobile Network and a Proposal of DLC Scheme in Wireless Link, Wireless Personal Communications: An International Journal, 17:2-3, (249-268), Online publication date: 1-Jun-2001.
  214. ACM
    O'Shea G and Roe M (2001). Child-proof authentication for MIPv6 (CAM), ACM SIGCOMM Computer Communication Review, 31:2, (4-8), Online publication date: 1-Apr-2001.
  215. Cheng P (2001). An architecture for the internet key exchange protocol, IBM Systems Journal, 40:3, (721-746), Online publication date: 1-Mar-2001.
  216. ACM
    Talwar V and Nahrstedt K Securing RSVP for multimedia applications Proceedings of the 2000 ACM workshops on Multimedia, (153-156)
  217. ACM
    Ioannidis S, Keromytis A, Bellovin S and Smith J Implementing a distributed firewall Proceedings of the 7th ACM conference on Computer and Communications Security, (190-199)
  218. ACM
    Savage S, Wetherall D, Karlin A and Anderson T (2000). Practical network support for IP traceback, ACM SIGCOMM Computer Communication Review, 30:4, (295-306), Online publication date: 1-Oct-2000.
  219. ACM
    Partridge C, Snoeren A, Strayer W, Schwartz B, Condell M and Castiñeyra I (2000). FIRE, ACM SIGCOMM Computer Communication Review, 30:4, (191-203), Online publication date: 1-Oct-2000.
  220. Architectural Impact of Secure Socket Layer on Internet Servers Proceedings of the 2000 IEEE International Conference on Computer Design: VLSI in Computers & Processors
  221. ACM
    Savage S, Wetherall D, Karlin A and Anderson T Practical network support for IP traceback Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, (295-306)
  222. ACM
    Partridge C, Snoeren A, Strayer W, Schwartz B, Condell M and Castiñeyra I FIRE Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, (191-203)
  223. Curtin M Shibboleth Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (20-20)
  224. Smart M, Malan G and Jahanian F Defeating TCP/IP stack fingerprinting Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (17-17)
  225. Zhang Y and Singh B A multi-layer IPsec protocol Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (16-16)
  226. Stone R Centertrack Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (15-15)
  227. ACM
    Lilley J, Yang J, Balakrishnan H and Seshan S A unified header compression framework for low-bandwidth links Proceedings of the 6th annual international conference on Mobile computing and networking, (131-142)
  228. Ouahidi B, Bouhdadi M and Bourget D The Internet is Challenging the Intelligent Network Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
  229. Borella M and Montenegro G RSIP Proceedings of the Workshop on Intelligence at the Network Edge, (3-3)
  230. ACM
    Mazières D, Kaminsky M, Kaashoek M and Witchel E (1999). Separating key management from file system security, ACM SIGOPS Operating Systems Review, 33:5, (124-139), Online publication date: 12-Dec-1999.
  231. ACM
    Mazières D, Kaminsky M, Kaashoek M and Witchel E Separating key management from file system security Proceedings of the seventeenth ACM symposium on Operating systems principles, (124-139)
  232. Schneider F, Bellovin S and Inouye A (1999). Building Trustworthy Systems, IEEE Internet Computing, 3:6, (64-72), Online publication date: 1-Nov-1999.
  233. ACM
    Savage S, Cardwell N, Wetherall D and Anderson T (1999). TCP congestion control with a misbehaving receiver, ACM SIGCOMM Computer Communication Review, 29:5, (71-78), Online publication date: 5-Oct-1999.
  234. ACM
    Duffield N, Goyal P, Greenberg A, Mishra P, Ramakrishnan K and van der Merive J (1999). A flexible model for resource management in virtual private networks, ACM SIGCOMM Computer Communication Review, 29:4, (95-108), Online publication date: 1-Oct-1999.
  235. ACM
    Duffield N, Goyal P, Greenberg A, Mishra P, Ramakrishnan K and van der Merive J A flexible model for resource management in virtual private networks Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, (95-108)
  236. Spencer R, Smalley S, Loscocco P, Hibler M, Andersen D and Lepreau J The flask security architecture Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (11-11)
  237. McDaniel P, Prakash A and Honeyman P Antigone Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (9-9)
  238. ACM
    Esler M, Hightower J, Anderson T and Borriello G Next century challenges Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, (256-262)
  239. ACM
    Ludwig R, Konrad A and Joseph A Optimizing the end-to-end performance of reliable flows over wireless links Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, (113-119)
  240. Narten T (1999). Neighbor Discovery and Stateless Autoconfiguration in IPv6, IEEE Internet Computing, 3:4, (54-62), Online publication date: 1-Jul-1999.
  241. de Raadt T, Hallqvist N, Grabowski A, Keromytis A and Provos N Cryptography in OpenBSD Proceedings of the annual conference on USENIX Annual Technical Conference, (33-33)
  242. Hardjono T Key Management Framework for IP Multicast Infrastructure Security Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market, (385-398)
  243. ACM
    Xu J and Singhal M Design of a high-performance ATM firewall Proceedings of the 5th ACM conference on Computer and communications security, (93-102)
  244. ACM
    Zhao X, Castelluccia C and Baker M Flexible network support for mobility Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, (145-156)
Contributors
  • BBN Technologies

Recommendations