On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on Information Security (IS'06), OTM Federated Conferences and workshops). Montpellier, Oct,/Nov. 2006There is a strong consensus about the need for IPsec, although its use is not widespread for end-to-end communications. One of the main reasons for this is the difficulty for authenticating two end-hosts that do not share a secret or do not rely on a common Certification Authority. In this paper we propose a modification to IKE to use reverse DNS and DNSSEC (named DNSSEC-to-IKE) to provide end-to-end authentication to Internet hosts that do not share any secret, without requiring the deployment of a new infrastructure. We perform a comparative ...
The major problem in DNS as originally specified in RFC 1035 is that it does not offer any form of s...
AbstractThe Internet Key Exchange (IKE) protocol is most widely used as a secure key exchange protoc...
In this article, we provide an overview of cryptography and cryptographic key management as they are...
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on...
IPsec is a collection of protocols that provides network layer data integrity and confidentiality se...
Abstract. The IPsec standard aims to provide application-transparent end-to-end security for the Int...
Many public-key-based key setup and key agreement protocols already exist and have been implemented ...
A key component of the IP Security architecture is the Internet Key Exchange protocol. IKE is invoke...
Abstract. Globally unique domain names and IP addresses that are provided in real time by the DNS (D...
The main goal of this thesis is to articulate and to prove security properties of the key exchange p...
This Master's project investigates how to strengthen the server authentication for end users using a...
As telecommunication technologies evolve, security in communications becomes a more and more relevan...
Exchange (IKE) Protocol. This protocol is used to create and maintain Internet Protocol Security (IP...
The global public-key authentication infrastructure standardized in the Domain Name System Security ...
IPsec has now become a standard information security technology throughout the Internet society. It ...
The major problem in DNS as originally specified in RFC 1035 is that it does not offer any form of s...
AbstractThe Internet Key Exchange (IKE) protocol is most widely used as a secure key exchange protoc...
In this article, we provide an overview of cryptography and cryptographic key management as they are...
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on...
IPsec is a collection of protocols that provides network layer data integrity and confidentiality se...
Abstract. The IPsec standard aims to provide application-transparent end-to-end security for the Int...
Many public-key-based key setup and key agreement protocols already exist and have been implemented ...
A key component of the IP Security architecture is the Internet Key Exchange protocol. IKE is invoke...
Abstract. Globally unique domain names and IP addresses that are provided in real time by the DNS (D...
The main goal of this thesis is to articulate and to prove security properties of the key exchange p...
This Master's project investigates how to strengthen the server authentication for end users using a...
As telecommunication technologies evolve, security in communications becomes a more and more relevan...
Exchange (IKE) Protocol. This protocol is used to create and maintain Internet Protocol Security (IP...
The global public-key authentication infrastructure standardized in the Domain Name System Security ...
IPsec has now become a standard information security technology throughout the Internet society. It ...
The major problem in DNS as originally specified in RFC 1035 is that it does not offer any form of s...
AbstractThe Internet Key Exchange (IKE) protocol is most widely used as a secure key exchange protoc...
In this article, we provide an overview of cryptography and cryptographic key management as they are...