1
0
mirror of https://github.com/2martens/uni.git synced 2026-05-06 19:36:26 +02:00

Sem: bibtex Datei aktualisiert

This commit is contained in:
Jim Martens
2014-11-12 10:59:48 +01:00
parent 288f2a2e06
commit 842a61fc57

View File

@ -70,8 +70,7 @@
Abstract = {This article describes the history of SSL/TLS and shows how it works. This goal is reached by explaining the basic differences between asymmetrical and symmetrical encryption algorithms, followed by the process that is used by SSL to start a secure session.}, Abstract = {This article describes the history of SSL/TLS and shows how it works. This goal is reached by explaining the basic differences between asymmetrical and symmetrical encryption algorithms, followed by the process that is used by SSL to start a secure session.},
Doi = {10.1109/MITP.2002.1046644}, Doi = {10.1109/MITP.2002.1046644},
Owner = {jim}, Owner = {jim},
Review = {This article is not scientific and falls into the common science area, where everything is explained well but not really backed up with references. Review = {This article is not scientific and falls into the common science area, where everything is explained well but not really backed up with references. This source should therefore not be used primarily, even though it comes from the IEEE.},
This source should therefore not be used primarily, even though it comes from the IEEE.},
Timestamp = {2014.10.24} Timestamp = {2014.10.24}
} }
@ -308,9 +307,17 @@ This source should therefore not be used primarily, even though it comes from th
Publisher = {Elsevier}, Publisher = {Elsevier},
Year = {2006}, Year = {2006},
Abstract = {In this article, we provide an overview of cryptography and cryptographic key management as they are specified in IPsec, a popular suite of standards for providing communications security and network access control for Internet communications. We focus on the latest generation of the IPsec standards, recently published as Request for Comments 43014309 by the Internet Engineering Task Force, and how they have evolved from earlier versions of the standards.
--
IPSec RFCs are huge. The current iteration of IPSec is a large improvement but has still some problems. Due to the backwards compatibility encryption-only is still supported which looks like missed opportunity. A comparison between IKEv1 and IKEv2 is presented, outlining their differences.
In some detail the content of the single RFCs is presented and the mandatory algorithms shown.},
Journal = {information security technical report}, Journal = {information security technical report},
Keywords = {IP, IPsec, network security, cryptography, key management}, Keywords = {IP, IPsec, network security, cryptography, key management},
Owner = {jim}, Owner = {jim},
Review = {Useful for referring to the cryptographic capabilities of IPSec, it's shortcomings and so on.},
Timestamp = {2014.10.24} Timestamp = {2014.10.24}
} }