|
[1] P.E.Sholander et al.,"The Effect of Algorithm-Agile Encryption on ATM Quality of Service,"Proc.IEEE Globecom '97,IEEE CS Press,Los Alamitors,Calif.,1997,pp.470-474 [2] Bird, et. al., "The KrypoKnight Family of Light-Weight Protocols for Authentication and Key Distribution," IEEE/ACM Trans. on Networking, vol. 3, No. 1, pp.31-41, Feb., 1995. [3] "ATM Security Specification Version 1.0", af-sec-0100.000, Feb., 1999. [4] C. Kaufman,R. Perlman,M. Speciner,"Network Security Private Communicationin a Public World,pp265-326,1999 [5] 賴溪松,韓亮,張真誠,"近代密碼學及其應用",pp70-90,1998 [6] Federal Information Processing Standards Publication 46-2(FIPS PUB 46- 2),"Data Encryption Standard(DES),"Dec.30,1993 [7] McDysan,Spohn,"ATM Theory and Application"pp417-437,1999 [8] Miyaguhi,S.,et.al, 'Expansion of FEAL Cipher," NTT Review, Vol.2, No.6, pp. 117-127, November 1990 [9] "Asynchronous transfer mode security Peyravian", T.D. IEEE Network Volume: 11 3 , May-June 1997 , Page(s): 34 -40 [10] "Secure communications in ATM networks" Laurent, M.; Bouabdallah, A.; Delahaye, C.; Leitold, H.; Posch, R.; Areizaga, E.; Robotiker, F.; Mateos, J.M.; Ingeniera, I. Computer Security Applications Conference, 1999. (ACSAC '99). Proceedings. 15th Annual , 1999 , Page(s): 84 -93 [11] C. Kaufman,R. Perlman,M. Speciner,"Network Security Private Communicationin a Public World,pp367-368,1999 [12]孫海榮,李樂民,"ATM技術概念.原理與應用",pp8-10,1996 [13] McDysan,Spohn,"ATM Theory and Application"pp217-223,1999 [14] "Security for ATM networks" ,Varadharajan, V.; Shankaran, R.Global Telecommunications Conference, 1997. GLOBECOM '97., IEEE Volume: 1 , 1997 , Page(s): 475 -480 vol.1 [15] "Security services and public key infrastructure for ATM networks",Varadharajan, V.; Shankaran, R.; Hitchens, M.Local Computer Networks, 1997. Proceedings., 22nd Annual Conference on , 1997 , Page(s): 253 -262 [16] "Secure signaling and access control for ATM networks", Shankaran, R.; Varadharajan, V. Computer Security Applications Conference, 1998. Proceedings.14th Annual , 1998 , Page(s):212 -222 [17]H.T.Kung and Rebert Morris,"Credit-Based Flow Control for ATM Network",IEEE Network,pp40-48,March/April 1995 [18] "Securing data transfer in asynchronous transfer mode networks", Deng, R.H.; Li Gong; Lazar, A.A. Global Telecommunications Conference, 1995. GLOBECOM '95.,IEEE Volume: 2 , 1995 , Page(s): 1198 -1202 vol.2 [19] "Secure signaling and access control for ATM networks",Shankaran, R.; adharajan, V.Computer Security Applications Conference, 1998. Proceedings 14th Annual , 1998 , Page(s): 212 -222 [20] Flavio Bonomi and Kerry W.Fendick,"The Rate-Based Flow Control Framework for the Available Bit Rate ATM Service",IEEE Network,pp.25-39 March/April 1995 [21] "Design of a key agile cryptographic system for OC-12c rate ATM", Stevenson, D.; Hillery, N.; Byrd, G.; Fengmin Gong; Winkelstein, D.Network and Distributed System Security, 1995., Proceedings of the Symposium on , 1995 , Page(s): 17 -30 [22] "ATM-encryption with 155 Mbit/s", Kuhn, S.; Ruland, C.; Wollenweber, K.ATM Workshop, 1999. IEEE Proceedings , 1999 , Page(s): 307-312 [23] "A secure ATM VP coordination protocol", Kroculick, J.; Hood, C.Military Communications Conference, 1998. MILCOM 98. Proceedings., IEEE Volume: 3 , 1998 , Page(s): 1023 -1027 vol.3
|