轻量级TCP/IP协议中安全技术研究作者:江国庆学位授予单位:国防科学技术大学参考文献(81条)1.参考文献2.AdamDunkelsDesignandImplementationofthelwIPTCP/IPStack3.AdamDunkels.ThiemoVoigt.JuanAlonsoMakingTCP/IPViableforWirelesssensorNetworks20044.AdamDunkelsFullTCP/IPfor8BitArchitectures20035.AdamDunkels.ThiemoVoigt.JuanAlonso.HartmutRitter,JochenSchillerConnectingWirelessSensornetswithTCP/IPNetworks20046.ADannenbergMSP430internetconnectivity7.CMX-TCPIP8.KwikNetTCP/IP9.韩光洁.赵海.王金东.林涛.王济勇EmbeddedInternet环境下TCP/IP协议簇的约简[期刊论文]-小型微型计算机系统2004(9)10.李立清.路海一种嵌入式TCP/IP的实现[期刊论文]-信息与电子工程2003(4)11.AdrianPerrig.RobertSzewczyk.JDTygar.VictorwenDavide.CullerSPINS:SecurityProtocolsforSensorNetworks200212.TaejoonPark.KangGShinLiSP:ALightweightSecurityProtocolforWirelessSensorNetworks2004(03)13.ChrisKarlof.NaveenSastry.DavidWagnerTinySec:ALinkLayerSecurityarchitectureforWirelessSensorNetworks200414.EfficientEmbeddedSecurityStandards(EESS)15.王勇嵌入式Internet的技术实现及其安全问题的研究[学位论文]博士200216.SteveKappIntemetSecurity:TheBasics200117.TracyThomas查看详情200118.SKent.RAtkinsonSecurityArchitecturefortheInternetProtocol199819.卿斯汉安全协议20年研究进展[期刊论文]-软件学报2003(10)20.卿斯汉安全协议的设计与逻辑分析[期刊论文]-软件学报2003(7)21.MAbadi.RlfeedhamPrudentengineeringpracticeforcryptographicprotocols1996(01)22.PaulFSyverson.PaulCvanOorschotOnUnifyingProtocolLogics199423.PaulESyverson.PaulCvanOorschotAUnifiedCryptographicProtocolLogic199624.TheNetworkSimulator-NS225.LGongFail-stopProtocols:AnApproachtoDesigningSecureProtocols[TechnicalReportSRI-CSL-94-14,ComputerScienceLaboratory,SRIInternational,MenloPark,California]199426.U.S.DepartmentofCommerceNBS.DataEncryptionStandard197727.查看详情28.PRogaway.DCoppersmithASoftware-OrientedEncryptionAlgorithm,FastSoftwareEncryption199429.AOFreier.PKarlton.PcKocherTheSSLProtocol,version3.0.Intemet-Draft,draft-freier-ssl-version3-02.txt199630.KEBHickmanTheSSLProtocol.Onlinedocument199531.WEP32.AESCandidateAlgorithms33.JDaemen.VRijmenAESProposal:Rijndael.AESProposal:NationalInstituteofStandardsandTechnology(NIST)199834.RBaldwin.RRivestTheRC5,RC5-CBC,RC5-CBC-Pad,andRC5-CTSAlgorithms199635.XLaiOntheDesignandSecurityofBlockCiphers199236.RLRivest.AShamir.LAdlemanAmethodforobtainingdigitalsignaturesandpublic-keycryptosystems1978(02)37.TE1GamalApublic-keycryptosystemandasignatureschemebasedondiscretelogarithms1985(04)38.NKoblitzEllipticCurveCryptosystems1987(177)39.YZheng.JPieprzyk.JSeberryHAVAL-AOne-WayHashingAlgorithmwithVariableLengthofOutput199340.RRivestTheMD5Message-DigestAlgorithm199241.NationalInstituteofStandardsandTechnologyNISTFIPSPUB186.DigitalSignatureStandard199442.RNeedham.MSchroederUsingencryptionforauthenticationinlargenetworksofcomputers1978(12)43.DOtway.OReesEfficientandTimelyMutualAuthentication1987(01)44.DEDenning.GMSaccoTimestampsinKeyDistributionProtocols1981(08)45.JKohl.CNeumanTheKerberosnetworkauthenticationservice199346.TYlonenTheSSH(secureshell)remoteloginprotocol.INTERNET-DRAFT,draft-ylonen-ssh-protocol-00.txt199547.PSyverson.CMeadows.ICervesatoDolev-Yaoisnobetterthanmachiavelli200048.DolevD.YaoAOnthesecurityofpublickeyprotocols1983(02)49.MichaelBurrows.MartinAbadi.RogerMNeedhamALogicofAuthentication[TechnicalReportSRCTechnicalReport39,DigitalEquipmentCorporation]198950.GongL.NeedhamR.YahalomRReasoningaboutbeliefincryptographicprotocols199051.AbadiM.TuttleMRAsemanticsforalogicofauthentication199152.vanOorschotPCExtendingcryptographiclogicsofbelieftokeyagreementprotocols199353.SyversonPF.vanOorschotPCOnunifyingsomecryptographicprotocollogics199454.查看详情55.SMV56.Failures-DivergenceRefinement,FDR2UserManual57.CMeadowsTheNRLProtocolAnalyzer:AnOverview199458.DHarkins.DCarrelTheInternetkeyexchangeprotocol(IKE)199859.Isabelle60.ISO7498-2.Informationprocessingsystems-OpenSystemsInterconnection-BasicReferenceModel--Part2:SecurityArchitecture61.SKent.RAtkinsonIPAuthenticationHeader199862.SKent.RAtkinsonIPEncapsulatingSecurityPayload199863.TDierks.CAllenTheTLSProtocol,Version1.0199964.JLinnPrivacyEnhancementforInternetElectronicMail:PartI:MessageEnciphermentandAuthenticationProcedures198765.PRZimmermannTheOfficialPGPUser'sGuide199566.S-HTTP67.李明.康静秋.贾智平嵌入式TCP/IP协议栈的研究与开发[期刊论文]-计算机工程与应用2002(16)68.WRichardStevens.范建华.张涛TCP/IP详解卷1:协议200069.DouglasEComer.DavidLStevens.林遥用TCP/IP进行网际互连,第一卷:原理,协议和体系结构200170.张玉清计算机通信网安全协议的分析研究[学位论文]博士200071.范红安全协议形式化分析理论与方法200372.WenboMao.王继林.伍前红现代密码学理论与实践200473.胡道元.闵京华网络安全200474.RDSchliching.EBSchneiderFail-stopProcessors:AnApproachtoDesigningFault-TolerantComputingSystems1983(03)75.江国庆.姚丹霖基于轻量级IP层的安全机制研究[会议论文]200576.江国庆.钟旭.王新建.姚丹霖一种基于可信第三方的安全协议77.XiaoyunWang.DengguoFeng.XuejiaLai.HongboYuCollisionsforHashFunctionsMD4,MD5,HAVAL-128andRIPEMD200478.ThensManual79.徐雷鸣.庞博.赵耀NS与网络模拟200380.JingDeng.RichardHan.ShivakantMishraEnhancingBaseStationSecurityinWirelessSensorNetworks81.Crypto++Library5.2.1相似文献(10条)1.期刊论文冯登国.范红安全协议形式化分析理论与方法研究综述-中国科学院研究生院学报2003,20(4)综述目前安全协议形式化分析的理论与方法,包括安全协议的分类与模型,安全协议形式化分析的3种典型方法(基于推理的结构性方法,基于攻击的结构性方法,基于证明的结构性方法),安全协议分析的形式化语言,安全协议设计的形式化方法,以及安全协议形式化分析面临的挑战.2.学位论文尹学永调和两种观点的安全协议形式化分析方法研究2009随着计算机网络的发展和电子商务的兴起与广泛应用,人们对网络安全的要求越来越迫切.在网络安全中,各种安全服务由安全协议来