Advertisement

Zusammenfassung

Internetstandards der IETF, die sogenannten „Request for Comments“(RFC), sin dim Imternet unter http://www.ietf.org/rfc.html zu finden. Kennt man bereits die Nummer des RFCs, z.B.RFC1234, so kann man auch direct auf http://www.ietf.org/rfc/rfc1234.txt zugreifen. Es wurde daher darauf verzichtet, die angegebenen RFCs hier noch einmal gesi\ondert aufzuführen.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. [3GPP]
    The 3GPP Website: http://www.3gpp.org.
  2. [802.11]
    Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. ANSI/IEEE Std 802.11, 1999 Edition.Google Scholar
  3. [AES]
    Federal Information Processing Standards Publication 197, November 26, 2001. Specification for the ADVANCED ENCRYPTION STANDARD (AES) http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  4. [AGS05]
    André Adelsbach, Sebastian Gajek and Jörg Schwenk: Phishing — Die Täuschung des Benutzers zur Preisgabe geheimer Benutzerdaten. 9. Deutscher IT- Sicherheitskongress des BSI, Mai 2005.Google Scholar
  5. [AS02]
    AirSnort Homepage: http://airsnort.shmoo.com/.
  6. [AST98]
    G. Ateniese, M. Steiner and G. Tsudik, Authenticated group key agreement and friends. 5th ACM Conference on Computer and Communication Security, November 1998.Google Scholar
  7. [B96]
    A. Ballardie, Scalable multicast key distribution. IETF RFC 1949, May 1996.Google Scholar
  8. [B97]
    Klaus-Clemens Becker, Design und Analyse von Konferenzschlüsselsystemen. Dissertation Justus-Liebig-Universität Gießen (1996), Shaker Verlag, Aachen 1997.Google Scholar
  9. [Bac]
    Adam Back, PGP Timeline, http://www.cypherspace.org/adam/timeline/
  10. [BauOO]
    F. L. Bauer, Entzifferte Geheimnisse. Methoden und Maximen der Kryptologie. Springer Verlag, 3. Auflage, Heidelberg 2000.MATHGoogle Scholar
  11. [BCD01]
    Mark Baugher, Ran Canetti, Lakshminath Dondeti, “Group Key Management Architecture”, Internet Draft, <draft-ietf-msec-gkmarch-01.txt>, October 23, 2001.Google Scholar
  12. [BD94]
    M. Burmester and Y. Desmedt, A secure and efficient conference key distribution system. Eurocrypt’94, Springer LNCS, pp. 275–288.Google Scholar
  13. [BD96]
    M. Burmester and Y. Desmedt, Efficient and secure conference key distribution. Cambridge Workshop on Security Protocols, Springer LNCS 1189, pp 119–129 (1996).MathSciNetGoogle Scholar
  14. [BDG88]
    J. L. Balcázar, J. Diaz und J. Gabarró, Structural Complexity I. Springer Verlag 1988.MATHGoogle Scholar
  15. [BDL97]
    D. Boneh, R. A. DeMillo und R. J. Lipton, On the Importance of Checking Computations. Proc. Eurocrypt ’97 (1997), 37–51.Google Scholar
  16. [Beu96]
    A. Beutelspacher, Kryptologie. 5. Auflage, Verlag Vieweg, Wiesbaden 1996.Google Scholar
  17. [Beu02]
    A. Beutelspacher, Kryptologie. 6. Auflage, Verlag Vieweg, Wiesbaden 2002.MATHGoogle Scholar
  18. [BGW01]
    N. Borisov, I. Goldberg und D. Wagner, Intercepting Mobile Communications: The Insecurity of 802.11. Mobicom 2001, http://www.isaac.cs.berkeley.edu/isaac/mobicom.pdf.Google Scholar
  19. [Bie96]
    W. Bieser, Sachstand der gesetzlichen Regelung zur digitalen Signatur. In: Digitale Signaturen, P. Horster (Hrsg.), Vieweg Verlag, Wiesbaden 1996.Google Scholar
  20. [Bih93]
    Eli Biham, On Modes of Operation. Proceedings of Fast Software Encryption 1, Cambridge Security Workshop, 1993, Springer LNCS 809.Google Scholar
  21. [BIND9]
    Berkley Internet Name Domain, Version 9, http://www.isc.org/sw/bind.
  22. [Ble98]
    D. Bleichenbacher “Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1” in Advances in Cryptology —CRYPTO’98, LNCS vol. 1462, pages: 1–12, 1998. http://www.bell-labs.com/user/bleichen/bib.html Google Scholar
  23. [BMSOO]
    D. Balenson, D. McGrew, A. Sherman: “Key Management for Large DynamicGroups: One-Way Function Trees and Amortized Initialization”, Internet Draft, <draft-irtf-smug-groupkeymgmt-oft-OO.txt>, August 25, 2000.Google Scholar
  24. [BP82]
    H. Beker und F. Piper, Cipher Systems. The Protection of Communication. Northwood, London 1982.Google Scholar
  25. [Bra88]
    G. Brassard, Modern Cryptology. Springer LNCS 325.Google Scholar
  26. [BRK95]
    A. Bartholomé, J. Rung und H. Kern: Zahlentheorie fur Einsteiger. Verlag Vieweg, Braunschweig und Wiesbaden 1995.CrossRefGoogle Scholar
  27. [BS99]
    Alex Biryukov, Adi Shamir: Real Time Cryptanalysis of the Alleged A5/1 on a PC (1999). http://citeseer.ist.psu.edu/biryukov99real.html Google Scholar
  28. [BSW0l]
    A. Beutelspacher, J. Schwenk und K.-D. Wolfenstetter, Moderne Verfahren der Kryptographie. 4. Auflage 2001, Vieweg Verlag Wiesbaden.MATHGoogle Scholar
  29. [BSW04]
    A. Beutelspacher, J. Schwenk und K.-D. Wolfenstetter, Moderne Verfahren derKryptographie. 5. Auflage 2004, Vieweg Verlag Wiesbaden.CrossRefGoogle Scholar
  30. [Buc01]
    J. Buchmann, Einführung in die Kryptographie, 2., durchges. u. erw. Aufl.,Springer-Verlag, 2001.MATHGoogle Scholar
  31. [BW98]
    C. Becker and U. Wille, Communication complexity of group key distribution. ACM Conference on Computer and Communication Security, November 1998.Google Scholar
  32. [CERT01]
    CERT® Advisory CA-2001–04 Unauthentic “Microsoft Corporation” Certificates. http://www.cert.org/advisories/CA-2001-04.html.
  33. [CG399]
  34. [COMP 128]
    Chaos Computer Club e.V.: CCC klont D2 Kundenkarte. http://www.ccc.de/gsm/.
  35. [DA99]
    T. Dierks, C. Allen: The TLS Protocol, Version 1.0 (RFC 2246).Google Scholar
  36. [DeCSS]
  37. [DES77]
    FIPS 46, “Data encryption standard”, Federal Information Processing Standards Publication 46, U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1977 (revised as FIPS 46–1:1988; FIPS 46–2:1993).Google Scholar
  38. [DH76]
    W. Diffie und M. E. Hellman, New Directions in Cryptography. IEEE Transactions on Information Theory, 6, November 1976, 644–654.MathSciNetCrossRefGoogle Scholar
  39. [Dif92]
    W. Diffie, The first ten years of Public Key Cryptography. In: Contemporary Cryptology: The Science of Information Integrity, G. J. Simmons, ed., IEEE Press 1992,65–134.Google Scholar
  40. [DIVX]
  41. [DK02]
    H. Delfs und H. Knebl, Introduction to Cryptography. Springer Verlag, Heidelberg 2002.CrossRefMATHGoogle Scholar
  42. [Dob96b]
    H. Dobbertin, “Cryptanalysis of MD4”, D. Gollmann, editor, Fast Software Encryption, Third International Workshop (LNCS 1039), 53–69, Springer-Verlag, 1996.CrossRefGoogle Scholar
  43. [Dob96]
    H. Dobbertin, Welche Hash-Funktionen sind für digitale Signaturen geeignet? In: Digitale Signaturen, P. Horster (Hrsg.), Vieweg Verlag, Wiesbaden 1996.Google Scholar
  44. [Dob96a]
    H. Dobbertin, Cryptanalysis of MD5 Compress. http://citeseer.ist.psu.edu/dobbertin96cryptanalysis.html.
  45. [DOW92]
    W. Diffie, P.C. van Oorschot and M. J. Wiener, Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2, 107–125 (1992)CrossRefGoogle Scholar
  46. [DRMDE]
  47. [DTD]
  48. [DVDRip]
  49. [EFF99]
  50. [E1G85]
    T. ElGamal, A Public Key Cryptosystem and a Signature Scheme based on Diskrete Logarithms. IEEE Trans, on Information Theory, Vol. IT-31 (1985), 469–472.MathSciNetCrossRefGoogle Scholar
  51. [Ethereal]
    Ethereal: Sniffing the glue that holds the Internet together. http://www.ethereal.com/.
  52. [FIPS91]
    FIPS PUB 186, Digital Signature Standard. Federal Information Processing Standard, National Institute of Standards and Technology, US Department of Commerce, Washington D. C. (1994).Google Scholar
  53. [FKK96]
    Alan O. Freier, Philip Karlton, Paul C. Kocher: The SSL Protocol, Version 3.0. http://home.netscape.com/eng/ssl3/ssl-toc.html.
  54. [FMS0l]
    S. Fluhrer, I. Mantin und A. Shamir, Weaknesses in Key Scheduling of RC4. Eight Annual Worshop on Selected Areas in Cryptography, August 2001. http://www.drizzle.com/~aboba/IEEE/rc4_ksaproc.pdf.Google Scholar
  55. [FR94]
    W. Fumy und H. P. Ries, Kryptographie. Oldenbourg Verlag, 2. Auflage, München 1994.MATHGoogle Scholar
  56. [G04]
    Gieben, Miek: DNSSEC: The Protocol, Deployment, and a Bit of Development. Internet Protocol Journal Vol. 7 No. 2, June 2004, pp. 17–28.Google Scholar
  57. [HH99]
    Hugh Harney, Eric Harder: “Logical Key Hierarchy Protocol”, Internet Draft, draft-harney-sparta-lkhp-sec-OO.txt, March, 1999.Google Scholar
  58. [His99]
  59. [HMP95]
    P. Horster, V. Michels und H. Petersen, Das Meta-ElGamal Signaturverfahren und seine Anwendungen. Proc. VIS’95, Vieweg Verlag, Wiesbaden 1995, 207–228.Google Scholar
  60. [HMR96]
    H. Harney, C. Muckenhirn and T. Rivers, Group key management protocol (gkmp) architecture. IETF Draft, 1996.Google Scholar
  61. [Hol03]
    John Holmblad, The Evolving Threats to the Availability and Security of the Domain Name Service. SANS Institute 2003, http://www.sans.org.Google Scholar
  62. [Hor85]
    P. Horster, Kryptologie. BI-Verlag, Mannheim 1985.MATHGoogle Scholar
  63. [Hui00]
    C. Huitema, IPv6, die neue Generation. Addison-Wesley, München 2000.Google Scholar
  64. [IDRM]
    Internet Digital Rights Management (IDRM), http://www.idrm.org/.
  65. [IKEv2]
    Internet Key Exchange (IKEv2) Protocol, http://www.ietf.org/internet-drafts/draft- ietf-ipsec-ikev2–17.txt
  66. [IM02]
    Security in a Web Services World: A Proposed Architecture and Roadmap. A joint security whitepaper from IBM Corporation and Microsoft Corporation. April 7,2002, Version 1.0. http://www-106.ibm.com/developerworks/webservices/library/ws-secmap/ oder http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwssecur/html/securitywhitepaper.asp
  67. [IMC]
    Internet Mail Consortium, http://www.imc.org.
  68. [Intertrust]
    Intertrust Digital Rights Management. http://www.intertrust.comhttp://www.intertrust.com/main/overview/drm.html.
  69. [IPSec]
  70. [IS08824–1]
    Information Technology — Abstract Syntax Notation One (ASN.1): Specification of Basic Notation. (International Standard ITU-T Rec. X.680 (1997) j ISO/IEC 8824–1:1998. http://www.itu.int/rec/recommendation.asp?type=folders&lang=e&parent=T-REC-X.680.
  71. [IS08825–10.
    Information technology — ASN.1 encoding rules: Specification of Basic ncoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). (International Standard ITU-T Rec. X.690 (1997) jISO/IEC 8825–1:1998. http://www.itu.int/rec/recommendation.asp?type=folders&lang=e&parent=T-REC-X.690.
  72. [ITW82]
    I. Ingemarsson, D. Tang and C. Wong, A conference key distribution system. IEEE Transactions on Information Theory 28/5, September 1982.Google Scholar
  73. [KH05]
    Vlastimil Klima: Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications, March 31, 2005, IACR ePrint archive, Report 2005/102, 3rd Int. Conference Security and Protection of Information 2005, Brno, Czech Republic, May 3–5, 2005.Google Scholar
  74. [KNT91]
    John T. Kohl, B. Clifford Neuman, Theodore Y. Ts’o, The Evolution of the Kerberos Authentication Service. Proc. 1991 EurOpen Conference, Tromso, Norway.Google Scholar
  75. [KPT00]
    Yongdae Kim, Adrian Perrig und Gene Tsudik, Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. Proc. Computer and Comm. Security, Athen 2000.Google Scholar
  76. [KR00]
    Vlastimil Klima und Tomas Rosa: Attack on Private Signature Keys of the OpenPGP format, PGP TM programs and other applications compatible with OpenPGP, http://eprint.iacr.org/2002/076.pdf
  77. [KR95]
    B. Kaliski and M. Robshaw, The Secure Use of RSA. CryptoBytes Vol. 1 No.3, RSA Laboratories, Autumn 1995.Google Scholar
  78. [KR00]
    David P. Kormann and Aviel D. Rubin, Risks of the Passport Single Signon Protocol. Computer Networks, Elsevier Science Press, volume 33, pages 51–58, 2000.Google Scholar
  79. [Kra86]
    E. Kranakis, Primality and Cryptography. Teubner Verlag, Stuttgart 1986.MATHGoogle Scholar
  80. [Kra96]
    Krawczyk, H., “SKEME: A Versatile Secure Key Exchange Mechanism for Internet”, from IEEE Proceedings of the 1996 Symposium on Network and Distributed Systems Security.Google Scholar
  81. [L99]
    LOpht Heavy Industries, Inc., LOphtcrack, 1999, http://www.atstake.com/products/lc/acrobat/atstake_lc5.pdf.
  82. [Mat97]
    M. Matsui, New Block Encryption Algorithm MISTY. Proc. 4th Int. Workshop on Fast Software Encryption. LNCS 1267, S. 54–68, Springer Verlag 1997.Google Scholar
  83. [Mer78]
    R.C. Merkle, “Secure communications over insecure channels”, Communications of the ACM, 21 (1978), 294–299.CrossRefGoogle Scholar
  84. [MOV97]
    A. J. Menezes, P.C. van Oorschot und S. A. Vanstone, Handbook of Applied Cryptography. CRC Press, New York 1997.MATHGoogle Scholar
  85. [MS01]
    A. Moller und M. I. Schwartzbach, DTD, XML Schema, and DSD. http://www.brics.dk/~amoeller/XML/schemas/.
  86. [MS98]
    B. Schneier and Mudge, Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP). Proceedings of the 5th ACM Conference on Communications and Computer Security, ACM Press, pp. 132–141. http://www.schneier.com/pptp.html)
  87. [MSAC]
  88. [MSDRM]
  89. [MSEC]
  90. [Multicast]
    Deutsche MBONE Informationsseite, http://www.mbone.de/.
  91. [NIST01]
    National Institute of Standards and Technology, Advanced Encryption Standard (AES). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
  92. [NR96]
    K. Nyberg und R. Rueppel, Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. Designs, Codes and Cryptography, 7, 61–81 (1996).MATHGoogle Scholar
  93. [NS78]
    R. M. Needham und M. D. Schroeder, Using Encryption for Authentication in Large Networks of Computers. Comm. ACM Vol. 21 Nr. 12 (1978), 993–999.CrossRefMATHGoogle Scholar
  94. [NSOS]
  95. [OASIS]
    Organization for the Advancement of Structured Information Standards. http://www.oasis-open.org
  96. [098]
    H. Orman, The OAKLEY key determination protocol. IETF RFC 2412, November 1998.Google Scholar
  97. [OpenSSL]
  98. [P99]
    A. Perrig. Efficient collaborative key management protocols for secure autonomous group communication. In CrypTEC ’99, pages 192–202,1999.Google Scholar
  99. [PCBTS01]
    Perrig, Canetti, Briscoe, Tygar, Song: “TESLA: Multicast Source AuthenticationTransform”, draft-irtf-smug-tesla-OO.txt, 17 November 2000.Google Scholar
  100. [PCT95]
    J. Benaloh, B. Lampson, D. Simon, T. Spies, B. Yee: The Private Communication Technology (PCT) Protocol. Internet Draft. October 1995.Google Scholar
  101. [PGP]
    PGP™ Corporation, http://www.pgp.com.
  102. [PGPdump]
    PGPdump Web Interface, http://www.pgpdump.net/.
  103. [PGPi]
    PGP International Homepage, http://www.pgpi.org.
  104. [PKCS]
    Public-Key Cryptography Standards, http://www.rsasecurity.com/rsalabs/pkcs/.
  105. [PKIX]
    IETF Public-Key Infrastructure (X.509) (pkix) Working Group: http://www.ietf.org/html.charters/pkix-charter.html.
  106. [PSM01]
    S. Pütz, R. Schmitz und T. Martin, Security Mechanisms in UMTS. Datenschutz und Datensicherheit 25 (2001).Google Scholar
  107. [PV01]
    J. Posegga und S. Vetter, Wireless Internet Security. Informatik Spektrum Band 24Heft 6, Dezember 2001, S. 383–386.Google Scholar
  108. [PW02]
    B. Pfitzmann und M. Waidner, BBAE — A General Protocol for Browser-basedAttribute Exchange. IBM Research Report RZ 3455 (# 93800) (2002).Google Scholar
  109. [RC4]
  110. [RFC NNNN]
  111. [RIPEMD]
    H. Dobbertin, A. Bosselaers, and B. Preneel, “RIPEMD-160: A strengthened version of RIPEMD”, Fast Software Encryption, LNCS Vol 1039, pp. 71–82. http://www.esat.kuleuven.ac.be/~bosselae/ripemdl60.html.
  112. [RR04]
    Jothy Rosenberg und David Remy, Securing Web Services with WS Security. Sams Publishing, Indianapolis, USA, 2004.Google Scholar
  113. [RSA]
  114. [RSA78]
    R. Rivest, A. Shamir und L. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Comm. ACM, Vol. 21, Nr. 2 (1978), 120–126.MathSciNetCrossRefMATHGoogle Scholar
  115. [Rue86]
    R. Rueppel, Analysis and Design of Stream Ciphers. Springer Verlag Berlin 1986.MATHGoogle Scholar
  116. [S98]
    J. Schwenk, Verfahren zum Etablieren eines gemeinsamen kryptografischen Schlüssels für n Teilnehmer, Patentantrag DE 198 47 941 (1998).Google Scholar
  117. [Sal90]
    A. Salomaa, Public-Key Cryptography. Springer Verlag Berlin Heidelberg 1990.MATHGoogle Scholar
  118. [SAML]
    Security Assertion Markup Language (SAML) v2.0. http://docs.oasis-open.org/security/saml/v2.0/saml-2.0-os.zip
  119. [SaS95]
    K. Sakurai and H. Shizuya, Relationships among the Computational Powers of Breaking Discrete Log Cryptosy stems. EUROCRYPT’95, Springer LNCS 921, pp.341–355.Google Scholar
  120. [Sch96]
    B. Schneier, Angewandte Kryptographie. 5. Auflage, Addison-Wesley, Bonn 1996.MATHGoogle Scholar
  121. [Schn90]
    C. P. Schnorr, Efficient Identification and Signature Schemes for Smart Cards.CRYPTO ’89, Springer LNCS 435 (1990), 239–251.MathSciNetGoogle Scholar
  122. [Schn96]
    B. Schneier, Angewandte Kryptographie. Addison-Wesley, Bonn 1996.MATHGoogle Scholar
  123. [SenOO]
    Ralf Senderek, Key-Experiments: How PGP Deals With Manipulated Keys. August 2000, http://senderek.de/security/key-experiments.html.
  124. [SHA93]
    ANSI X9.30 (PART 2), “American National Standard for Financial Services — Public key cryptography using irreversible algorithms for the financial services industry — Part 2: The secure hash algorithm (SHA)”, ASC X9 Secretariat — American Bankers Association, 1993. http://www.itl.nist.gov/fipspubs/fip180-l.htm.
  125. [SigGOl]
    Gesetz über Rahmenbedingungen für elektronische Signaturen und zur Änderung weiterer Vorschriften, http://www.dud.de/dud/documents/sigg010214.pdf
  126. [SigG97]
    Gesetz zur digitalen Signatur (Signaturgesetz — SigG). Bundesgesetzblatt I S. 1870, 1872 (oder http://www.regtp.de/tech_reg_tele/start/in_06-02-01-00-00_m/index.html)
  127. [SigV97]
    Verordnung zur digitalen Signatur (Signaturverordnung — SigV) http://www.regtp.de/tech_reg_tele/start/in_06-02-01-00-00_m/index.html
  128. [Sim92]
    G. J. Simmons (Hrsg.), Contemporary Cryptology. IEEE Press 1992.MATHGoogle Scholar
  129. [SKIP]
    A. Aziz, T. Markson und H. Prafullchandra: Simple Key Management for Internet Protocols (SKIP). http://www.skip-vpn.org/spec/SKIP.html (Link nicht mehr verfügbar).
  130. [Sle01]
    Mark Slemko, Microsoft Passport to Trouble, http://alive.znep.com/~marcs/ passport/.Google Scholar
  131. [SM98]
    B. Schneier and Mudge, Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP). Proceedings of the 5th ACM Conference on Communications and Computer Security, ACM Press, November 1998 http://www.schneier.com/paper-pptp.html.
  132. [SMIME]
  133. [SMSOl]
    J. Schwenk, T. Martin und R. Schaffelhofer, Tree based Key Agreement for Multicast. Proc. Communications and Multimedia Security 2001, Mai 2001, Darmstadt.Google Scholar
  134. [SMUG]
  135. [SMW99]
    B. Schneier, Mudge und D. Wagner, “Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2). Proc. of CQRE: International Exhibition and Congress on Secure Networking (1999). http://www.schneier.com/paper-pptpv2.html.Google Scholar
  136. [SOAP]
    SOAP Version 1.2. http://www.w3.org/2002/ws/.
  137. [SOAPSig]
    SOAP Security Extensions: Digital Signature. http://www.w3.org/TR/SOAP-dsig/.
  138. [Som02]
    S. Somogyi, PGP is dead! Long live PGP? Maybe. ZDNet, 5.3.2002, http://zdnet.com.eom/2100–1107–851515.html.Google Scholar
  139. [SpiOO]
  140. [S-RTP]
  141. [SSL2]
    Kipp E.B. Hickman: The SSL Protocol (2.0).http://home.netscape.com/eng/security/SSL_2.html.
  142. [SSL3]
    Alan O. Freier, Philip Karlton, Paul C. Kocher, The SSL Protocol Version 3.0. Internet Draft, March 1996. http://wp.netscape.com/eng/ssl3/ssl-toc.html.Google Scholar
  143. [Ste99]
    Frank A. Stevenson, Cryptanalysis of Contents Scrambling System. 8th November 1999. http://www.derfrosch.de/decss/.Google Scholar
  144. [Ste02]
    Joe Stewart, DNS Cache Poisoning — The Next Generation. http://www.lurhq.com/cachepoisoning.html.
  145. [Sti95]
    D. R. Stinson, Cryptography. CRC Press Boca Raton, London, Tokyo 1995.MATHGoogle Scholar
  146. [STS92]
    W. Diffie, P.C. Van Oorschot, and M.J. Wiener, “Authentication and Authenticated Key Exchanges,” in Designs, Codes and Cryptography, Kluwer Academic Publishers, 1992, pp. 107Google Scholar
  147. [STW96]
    M. Steiner, G. Tsudik and M. Waidner, Diffie-Hellman key distribution extended togroups. ACM Conference on Computer and Communication Security, pp 31–37, March 1996.Google Scholar
  148. [STW98]
    M. Steiner, G. Tsudik and M. Waidner, CLIQUES: A new approach to group key agreement. IEEE International Conference on Distributed Computing Systems, May 1998.Google Scholar
  149. [Tan01]
    Andrew S. Tanenbaum, Modern Operating Systems (2nd ed.). Prentice Hall International, London 2001.Google Scholar
  150. [Tan02]
    Andrew S. Tanenbaum, Computer Networks (4th ed.). Prentice Hall International, London 2002.Google Scholar
  151. [Tie01]
    Robert J. Tiess, Simple Sample DTD/XML 1.0 Generator, 2001. http://rtiess.tripod.com/dtdxml.htm.Google Scholar
  152. [TLS]
    IETF Transport Layer Security (tls) working group, The TLS Protocol Version 1.0 (RFC2246). http://www.ietf.org/html.charters/tls-charter.html.
  153. [TPG]
  154. [UDDI]
    Universal Description, Discovery and Integration (UDDI). http://www.uddi.org.
  155. [USPAT]
    United States Patent and Trademark Office, http://www.uspto.gov/patft/index.html.
  156. [VPNC]
    Virtual Private Network Consortium, http://www.vpnc.org/vpn-standards.html.
  157. [W3C]
    WWW Consortium, http://www.w3.org.
  158. [W3CDRM]
    W3C DRM 2001 Workshop Notes & Presentations. http://www.w3.org/2000/12/drm-ws/minutes/.
  159. [WC02]
  160. [WSDL]
    Web Service Description Language 2.0. http://www.w3.org/2002/ws/.
  161. [WSFed]
    Web Services Federation Language (WS-Federation), 08 July 2003. http://www-128.ibm.com/developerworks/webservices/library/ws-fed/
  162. [WSSC]
    Web Services Secure Conversation Language (WS-SecureConversation), May 2004, updated February 2005. ftp://www.software.ibm.com/software/developer/library/ws-secureconversation.pdf
  163. [WSSec]
    Web Services Security: SOAP Message Security 1.0 (WS-Security 2004). http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0.pdf
  164. [WSSP]
    Web Services Security Policy (WS-SecurityPolicy), Draft 18 December 2002. http://www-128.ibm.com/developerworks/webservices/library/ws-secpol/
  165. [WSTr]
    Web Services Trust Language (WS-Trust), May 2004, updated February 2005. ftp://www.software.ibm.com/software/developer/library/ws-trust.pdf
  166. [X.500]
    ITU-T Recommendation X.500 (1997) | ISO/IEC 9594–1:1997, Information technology — Open Systems Interconnection — The Directory: Overview of concepts, models and servicesGoogle Scholar
  167. [X.501]
    ITU-T Recommendation X.501 (1997) | ISO/IEC 9594–2:1997, Information technology — Open Systems Interconnection — The Directory: ModelsGoogle Scholar
  168. [X.509]
    ITU-T Recommendation X.509 (1997) | ISO/IEC 9594–8:1997, Information technology — Open Systems Interconnection — The Directory: Authentication frameworkGoogle Scholar
  169. [X.520]
    ITU-T Recommendation X.520 (1997) | ISO/IEC 9594–6:1997, Information technology — Open Systems Interconnection — The Directory: Selected attribute types.Google Scholar
  170. [XML10]
    XML in 10 Points. http://www.w3.org/XML/1999/XML-in-10-points
  171. [XMLCan]
    Canonical XML Version 1.0. http://www.w3.org/TR/2001/REC-xml-cl4n-20010315.
  172. [XMLEnc]
  173. [XMLEnc2]
    XML Encryption Syntax and Processing. http://www.w3.org/TR/xmlenc-core/.
  174. [XMLKey]
    XML Key Management WG. http://www.w3.org/2001/XKMS/.
  175. [XMLPro]
  176. [XMLSchema]
    XML Schema, www.w3.orgGoogle Scholar
  177. [XMLSig]

Copyright information

© Friedr. Vieweg & Sohn Verlag/GWV Fachverlage GmbH, Wiesbaden 2005

Authors and Affiliations

  • Jörg Schwenk
    • 1
  1. 1.Lehrstuhl für Netz- und DatensicherheitRuhr-Universität BochumBochumDeutschland

Personalised recommendations