|
[1] T. Aura, P. Nikander, and G. Camarillo, ”Effects of Mobility and Multihoming on Transport-Protocol Security,” IEEE Symposium on Security and Privacy, Berkeley, California, pp. 12-26, May 2004. [2] S. Bellovin, J. Ioannidis, A. Keromytis, and R. Stewart, ”On the use of stream control transmission protocol (SCTP) with IPsec,” RFC 3554, July 2003. [3] E. Cha, H. K. Choi, and S. J. Cho, ”Evaluation of Security Protocols for the Session Initiation Protocol,” IEEE Network, pp. 611-616, Aug. 2007 [4] P. T. Conrad, G. J. Heinz, A. L. Caro, P. D. Amer, and J. Fiore, ”SCTP in Battlefield Networks,” Proc. IEEE MILCOM 2001, pp. 289-295, Oct. 2001. [5] T. Dierks and C. Allen, ”The TLS Protocol,” RFC 2246, IETF, Jan. 1999. [6] C. Hohendorf, E. P. Rathgeb, E. Unurkhaan, and M. Tuxen, ”Secure end-to-end transport over SCTP.” Emerging Trends in Information and Communication Security, Lecture Notes in Computer Science, vol. 1880, Springer, Berlin, pp. 381-395, 2006. [7] A. Jungmaier, E. Rescorla and M. Tuexen, ”Transport Layer Security over Stream Control Transmission Protocol,” RFC 3436, Dec. 2002. [8] S˙ J. Koh, M. J. Chang, and M. L, ”mSCTP for Soft Handover in Transport Layer,” IEEE communications letters, VOL. 8, No. 3, pp. 189-191, Mar. 2004. [9] C. Kaufman, ”Internet Key Exchange (IKEv2) Protocol,” RFC 4306, IETF, Dec. 2005. [10] H. Krawczyk, M. Bellare, and R. Canetti, ”HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, IETF, Feb. 1997. [11] S. Kent and K. Seo, ”Security Architecture for the Internet Protocol,” RFC 4301, IETF, Dec. 2005. [12] S. Kent, ”IP Authentication Header,” RFC 4302, IETF, Dec. 2005. [13] S. Kent, ”IP Encapsulation Security Payload (ESP),” RFC 4303, IETF, Dec. 2005. [14] S. Lindskog and A. Brunstrom, ”An End-to-End Security Solution for SCTP,” IEEE Availability, Reliability and Security, pp. 526-531, Mar. 2008. [15] L. Ong and J. Yoakum, ”An Introduction to the Stream Control Transmission Protocol (SCTP),” RFC 3286, IETF, May 2002. [16] E. Rescorla and N. Modadugu, ”Datagram transport layer security,” RFC 4347, IETF, Apr. 2006. [17] R. Stewart, Q. Xie et. al., ”Stream Control Transmission Protocol,” RFC 2960, IETF, Oct. 2000. [18] R. Stewart, ”Stream Control Transmission Protocol,” RFC 4960, IETF, Sept. 2007. [19] R. Stewart, Q. Xie et. al., ”Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration,” RFC 5061, IETF, Sept. 2007. [20] R Stewart, M. Tuexen, and G. Camarillo, ”Security Attacks Found Against the Stream Control Transmission Protocol (SCTP) and Current Countermeasures,” RFC 5062, IETF, Sep. 2007. [21] M. Tuexen, P. Lei, and E. Rescorla, ”Authenticated Chunks for the Stream Control Transmission Protocol (SCTP),” RFC 4895, IETF, Aug. 2007. [22] E. Unurkhaan, E. P. Rathgeb, and A. Jungmaier, ”Secure SCTP - A Versatile Secure Transport Protocol,” Telecommunication Systems, vol. 27, no. 2-4, pp. 273-296, 2004. [23] SCTP Release Notes, http://docs.hp.com/en/5992-6610/5992-6610.pdf
|