From 842a61fc57e72c0cd198825b777bd0ff89b59535 Mon Sep 17 00:00:00 2001 From: Jim Martens Date: Wed, 12 Nov 2014 10:59:48 +0100 Subject: [PATCH] Sem: bibtex Datei aktualisiert --- sem/sem.bib | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/sem/sem.bib b/sem/sem.bib index 42c7a87..4a6dd15 100755 --- a/sem/sem.bib +++ b/sem/sem.bib @@ -70,8 +70,7 @@ Abstract = {This article describes the history of SSL/TLS and shows how it works. This goal is reached by explaining the basic differences between asymmetrical and symmetrical encryption algorithms, followed by the process that is used by SSL to start a secure session.}, Doi = {10.1109/MITP.2002.1046644}, Owner = {jim}, - Review = {This article is not scientific and falls into the common science area, where everything is explained well but not really backed up with references. -This source should therefore not be used primarily, even though it comes from the IEEE.}, + Review = {This article is not scientific and falls into the common science area, where everything is explained well but not really backed up with references. This source should therefore not be used primarily, even though it comes from the IEEE.}, Timestamp = {2014.10.24} } @@ -308,9 +307,17 @@ This source should therefore not be used primarily, even though it comes from th Publisher = {Elsevier}, Year = {2006}, + Abstract = {In this article, we provide an overview of cryptography and cryptographic key management as they are specified in IPsec, a popular suite of standards for providing communications security and network access control for Internet communications. We focus on the latest generation of the IPsec standards, recently published as Request for Comments 4301–4309 by the Internet Engineering Task Force, and how they have evolved from earlier versions of the standards. + +-- + +IPSec RFCs are huge. The current iteration of IPSec is a large improvement but has still some problems. Due to the backwards compatibility encryption-only is still supported which looks like missed opportunity. A comparison between IKEv1 and IKEv2 is presented, outlining their differences. + +In some detail the content of the single RFCs is presented and the mandatory algorithms shown.}, Journal = {information security technical report}, Keywords = {IP, IPsec, network security, cryptography, key management}, Owner = {jim}, + Review = {Useful for referring to the cryptographic capabilities of IPSec, it's shortcomings and so on.}, Timestamp = {2014.10.24} }