Cover

Sichere Netzwerkkommunikation

Grundlagen, Protokolle und Architekturen

Literaturverzeichnis

Springe zu: 10, 20, 30, 40, 50, 60, 70, 80, 90, 100 110, 120, 130, 140, 150, 160, 170, 180, 190, 200 210, 220, 230, 240, 250, 260, 270, 280, 290, 300 310, 320, 330, 340, 350, 360, 370, 380, 390

1. Aboba, B., L. Blunk, J. Vollbrecht, J. Carlson und H. Levkowetz: Extensible Authentication Protocol (EAP). RFC 3748 (Proposed Standard), IETF, Juni 2004. URL: http://www.ietf.org/rfc/rfc3748.txt

2. Aboba, B. und W. Dixon:IPsec-Network Address Translation (NAT) Compatibility Requirements. RFC 3715 (Informational), IETF, März 2004. URL: http://www.ietf.org/rfc/rfc3715.txt

3. Aboba, B. und D. Simon:PPP EAP TLS Authentication Protocol. RFC 2716 (Experimental), IETF, Oktober 1999. URL: http://www.ietf.org/rfc/rfc2716.txt

4. Accredited Standards Committee X3: American National Standard X3.92-1981: Data Encryption Algorithm DEA, 1981.

5. Accredited Standards Committee X9: American National Standard X9.17-1985: Financial Institution Key Management (Wholesale), 1985.

6. Accredited Standards Committee X9: American National Standard X9.62-1998: Public Key Cryptography For the Financial Services Industry: Elliptic Curve Digital Signature Algorithm (ECDSA), 1998.

7. Adams, C.: The CAST-128 Encryption Algorithm. RFC 2144 (Informational), IETF, Mai 1997. URL: http://www.ietf.org/rfc/rfc2144.txt

8. Alaettinoglu, C., C. Villamizar, E. Gerich, D. Kessens, D. Meyer, T. Bates, D. Karrenberg und M. Terpstra: Routing Policy Specification Language (RPSL). RFC 2622 (Proposed Standard), IETF, Juni 1999. Aktualisiert durch RFC 4012. URL: http://www.ietf.org/rfc/rfc2622.txt

9. Altman, J.: Telnet Encryption: CAST-128 64 bit Cipher Feedback. RFC 2950 (Proposed Standard), IETF, September 2000. URL: http://www.ietf.org/rfc/rfc2950.txt

10. Altman, J.: Telnet Encryption: CAST-128 64 bit Output Feedback. RFC 2949 (Proposed Standard), IETF, September 2000. URL: http://www.ietf.org/rfc/rfc2949.txt

11. Altman, J.: Telnet Encryption: DES3 64 bit Cipher Feedback. RFC 2947 (Proposed Standard), IETF, September 2000. URL: http://www.ietf.org/rfc/rfc2947.txt

12. Anderson, R., F. Bergadano, B. Crispo, J. Lee, C. Manifavas und R. Needham: A New Family of Authentication Protocols. ACMOSR: ACM Operating Systems Review, 32, 1998.

13. Anderson, R., E. Biham und L. Knudsen: Serpent: A New Block Cipher Proposal. In: Fifth International Workshop on Fast Software Encryption, 1998.

14. Andersson, L., P. Doolan, N. Feldman, A. Fredette und B. Thomas: LDP Specification. RFC 3036 (Proposed Standard), IETF, Januar 2001. URL: http://www.ietf.org/rfc/rfc3036.txt

15. Andersson, L. und G. Swallow: The Multiprotocol Label Switching (MPLS) Working Group decision on MPLS signaling protocols. RFC 3468 (Informational), IETF, Februar 2003. URL: http://www.ietf.org/rfc/rfc3468.txt

16. Arends, R., R. Austein, M. Larson, D. Massey und S. Rose: DNS Security Introduction and Requirements. RFC 4033 (Proposed Standard), IETF, März 2005. URL: http://www.ietf.org/rfc/rfc4033.txt

17. Arends, R., R. Austein, M. Larson, D. Massey und S. Rose: Protocol Modifications for the DNS Security Extensions. RFC 4035 (Proposed Standard), IETF, März 2005. URL: http://www.ietf.org/rfc/rfc4035.txt

18. Arends, R., R. Austein, M. Larson, D. Massey und S. Rose: Resource Records for the DNS Security Extensions. RFC 4034 (Proposed Standard), IETF, März 2005. URL: http://www.ietf.org/rfc/rfc4034.txt

19. Arkko, J., J. Kempf, B. Zill und P. Nikander: SEcure Neighbor Discovery (SEND). RFC 3971 (Proposed Standard), IETF, März 2005. URL: http://www.ietf.org/rfc/rfc3971.txt

20. Atkins, D., W. Stallings und P. Zimmermann: PGP Message Exchange Formats. RFC 1991 (Informational), IETF, August 1996. URL: http://www.ietf.org/rfc/rfc1991.txt

21. Aura, T.: Cryptographically Generated Addresses (CGA). RFC 3972 (Proposed Standard), IETF, März 2005. URL: http://www.ietf.org/rfc/rfc3972.txt

22. Awduche, D., L. Berger, D. Gan, T. Li, V. Srinivasan und G. Swallow: RSVP-TE: Extensions to RSVP for LSP Tunnels. RFC 3209 (Proposed Standard), IETF, Dezember 2001. Aktualisiert durch RFC 3936. URL: http://www.ietf.org/rfc/rfc3209.txt

23. Awduche, D., J. Malcolm, J. Agogbua, M. O'Dell und J. McManus: Requirements for Traffic Engineering Over MPLS. RFC 2702 (Informational), IETF, September 1999. URL: http://www.ietf.org/rfc/rfc2702.txt

24. Baker, F.: Requirements for IP Version 4 Routers. RFC 1812 (Proposed Standard), IETF, Juni 1995. Aktualisiert durch RFC 2644. URL: http://www.ietf.org/rfc/rfc1812.txt

25. Baker, F. und R. Atkinson: RIP-2 MD5 Authentication. RFC 2082 (Proposed Standard), IETF, Januar 1997. URL: http://www.ietf.org/rfc/rfc2082.txt

26. Baker, F., B. Lindell und M. Talwar: RSVP Cryptographic Authentication. RFC 2747 (Proposed Standard), IETF, Januar 2000. Aktualisiert durch RFC 3097. URL: http://www.ietf.org/rfc/rfc2747.txt

27. Baker, F. und P. Savola: Ingress Filtering for Multihomed Networks. RFC 3704 (Best Current Practice), IETF, März 2004. URL: http://www.ietf.org/rfc/rfc3704.txt

28. Balenson, D.: Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers. RFC 1423 (Proposed Standard), IETF, Februar 1993. URL: http://www.ietf.org/rfc/rfc1423.txt

29. Baugher, M., D. McGrew, M. Naslund, E. Carrara und K. Norrman: The Secure Real-time Transport Protocol (SRTP). RFC 3711 (Proposed Standard), IETF, März 2004. URL: http://www.ietf.org/rfc/rfc3711.txt

30. Bayer, R. und J. K. Metzger: On the Encipherment of Search Trees and Random Access Files. ACM Transactions on Database Systems, 1976.

31. Beadles, M. und D. Mitton: Criteria for Evaluating Network Access Server Protocols. RFC 3169 (Informational), IETF, September 2001. URL: http://www.ietf.org/rfc/rfc3169.txt

32. Bellare, M., T. Kohno und C. Namprempre: Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encodethen- Encrypt-and-MAC paradigm. ACM Transactions on Information System Security, 7(2):206--241, 2004.

33. Berners-Lee, T., R. Fielding und H. Frystyk: Hypertext Transfer Protocol -- HTTP/1.0. RFC 1945 (Informational), IETF, Mai 1996. URL: http://www.ietf.org/rfc/rfc1945.txt

34. Berners-Lee, T., R. Fielding und L. Masinter: Uniform Resource Identifier (URI): Generic Syntax. RFC 3986 (Standard), IETF, Januar 2005. URL: http://www.ietf.org/rfc/rfc3986.txt

35. Bernstein, D. J.: What are SYN cookies?, Februar 1997. URL: http://cr.yp.to/syncookies.html

36. Berry, S. P.: Shoki, Dezember 2004. URL: http://shoki.sourceforge.net

37. Biege, T. und F. Garrigues: M-ICE: Modular Intrusion Coutermeasure Env., Dezember 2004. URL: http://sourceforge.net/projects/m-ice/

38. Blake, S., D. Black, M. Carlson, E. Davies, Z. Wang und W. Weiss: An Architecture for Differentiated Service. RFC 2475 (Informational), IETF, Dezember 1998. Aktualisiert durch RFC 3260. URL: http://www.ietf.org/rfc/rfc2475.txt

39. Blake-Wilson, S., M. Nystrom, D. Hopwood, J. Mikkelsen und T. Wright: Transport Layer Security (TLS) Extensions. RFC 3546 (Proposed Standard), IETF, Juni 2003. URL: http://www.ietf.org/rfc/rfc3546.txt

40. Bleichenbacher, D.: Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. In: Advances in Cryptology -- CRYPTO'98, LNCS 1462, S. 1--12. Springer-Verlag, 1998.

41. Bluetooth SIG Security Expert Group: Bluetooth Security White Paper. Technischer Bericht, Bluetooth SIG, April 2002.

42. Bluetooth Special Interest Group: Specification of the Bluetooth System, November 2003. Version 1.2. URL: http://www.bluetooth.com

43. Bluetooth Special Interest Group: The Official Bluetooth Wireless Info Site, November 2004. URL: http://www.bluetooth.com

44. Blumenthal, U. und B. Wijnen: User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). RFC 3414 (Standard), IETF, Dezember 2002. URL: http://www.ietf.org/rfc/rfc3414.txt

45. Blunk, D. und A. Girardet: WEPAttack Entwickler-Homepage bei Sourceforge, Dezember 2004. URL: http://wepattack.sourceforge.net

46. Boeyen, S., T. Howes und P. Richard: Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2. RFC 2559 (Historic), IETF, April 1999. Obsolet durch RFC 3494. URL: http://www.ietf.org/rfc/rfc2559.txt

47. Boor, F. und J. Fernquist: PrismStumbler Entwickler-Homepage bei Sourceforge, Dezember 2004. URL: http://prismstumbler.sourceforge.net

48. Braden, R.: Requirements for Internet Hosts - Communication Layers. RFC 1122 (Standard), IETF, Oktober 1989. Aktualisiert durch RFC 1349. URL: http://www.ietf.org/rfc/rfc1122.txt

49. Braden, R. und L. Zhang: RSVP Cryptographic Authentication -- Updated Message Type Value. RFC 3097 (Proposed Standard), IETF, April 2001. URL: http://www.ietf.org/rfc/rfc3097.txt

50. Braden, R., L. Zhang, S. Berson, S. Herzog und S. Jamin: Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification. RFC 2205 (Proposed Standard), IETF, September 1997. Aktualisiert durch RFCs 2750, 3936. URL: http://www.ietf.org/rfc/rfc2205.txt

51. Bradner, S. und V. Paxson: IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers. RFC 2780 (Best Current Practice), IETF, März 2000. URL: http://www.ietf.org/rfc/rfc2780.txt

52. Bundesamt für Sicherheit in der Informationstechnik: Bluetooth Gefährdungen und Sicherheitsmaßnahmen. Technischer Bericht, BSI, 2003. URL: http://www.bsi.de

53. Bundesamt für Sicherheit in der Informationstechnik: IT-Grundschutzhandbuch, 2004. URL: http://www.bsi.de

54. Bundesrepublik Deutschland: Bürgerliches Gesetzbuch, 2004. Abschnitt 3, §126: Schriftform.

55. Burwick, C., D. Coppersmith, E. D'Avignon, R. Gennaro, S. Halevi, C. Jutla, S. M. M. Jr., L. O. Connor, M. Peyravian, D. Safford und N. Zunic: MARS - a candidate cipher for AES. First AES Conference, August 1998.

56. Calhoun, P., J. Loughney, E. Guttman, G. Zorn und J. Arkko: Diameter Base Protocol. RFC 3588 (Proposed Standard), IETF, September 2003. URL: http://www.ietf.org/rfc/rfc3588.txt

57. Calhoun, P. R., G. Zorn, D. Spence und D. Mitton: Diameter Network Access Server Application. Internet-Draft -- draft-ietf-aaa-diameter-nasreq- 17.txt, IETF, Juli 2004. Arbeitsdokument der IETF.

58. Callaghan, B., B. Pawlowski und P. Staubach: NFS Version 3 Protocol Specification. RFC 1813 (Informational), IETF, Juni 1995. URL: http://www.ietf.org/rfc/rfc1813.txt

59. Callas, J., L. Donnerhacke, H. Finney und R. Thayer: OpenPGP Message Format. RFC 2440 (Proposed Standard), IETF, November 1998. URL: http://www.ietf.org/rfc/rfc2440.txt

60. Callon, R.: Use of OSI IS-IS for routing in TCP/IP and dual environments. RFC 1195 (Proposed Standard), IETF, Dezember 1990. Aktualisiert durch RFC 1349. URL: http://www.ietf.org/rfc/rfc1195.txt

61. Campbell, B. und R. Sparks: Control of Service Context using SIP Request- URI. RFC 3087 (Informational), IETF, April 2001. URL: http://www.ietf.org/rfc/rfc3087.txt

62. Carpenter, B.: Internet Transparency. RFC 2775 (Informational), IETF, Februar 2000. URL: http://www.ietf.org/rfc/rfc2775.txt

63. Carpenter, B. und K. Moore: Connection of IPv6 Domains via IPv4 Clouds. RFC 3056 (Proposed Standard), IETF, Februar 2001. URL: http://www.ietf.org/rfc/rfc3056.txt

64. Case, J., M. Fedor, M. Schoffstall und J. Davin: Simple Network Management Protocol (SNMP). RFC 1157 (Historic), IETF, Mai 1990. URL: http://www.ietf.org/rfc/rfc1157.txt

65. Case, J., D. Harrington, R. Presuhn und B. Wijnen: Message Processing and Dispatching for the Simple Network Management Protocol (SNMP). RFC 3412 (Standard), IETF, Dezember 2002. URL: http://www.ietf.org/rfc/rfc3412.txt

66. Case, J., K. McCloghrie, M. Rose und S. Waldbusser: Introduction to version 2 of the Internet-standard Network Management Framework. RFC 1441 (Historic), IETF, April 1993. URL: http://www.ietf.org/rfc/rfc1441.txt

67. Case, J., R. Mundy, D. Partain und B. Stewart: Introduction and Applicability Statements for Internet-Standard Management Framework. RFC 3410 (Informational), IETF, Dezember 2002. URL: http://www.ietf.org/rfc/rfc3410.txt

68. Caswell, B. und M. Roesch: Snort: The Open Source Network Intrusion Detection System, Januar 2005. URL: http://www.snort.org/docs/snort manual/

69. Center, C. C.: CERT Advisory CA-1992-02 Michelangelo PC Virus Warning, Februar 1992. URL: http://www.cert.org/advisories/CA-1992-02.html

70. Center, C. C.: CERT Advisory CA-2002-03 Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP), Februar 2002. URL: http://www.cert.org/advisories/CA-2002-03.html

71. Cerf, V.: IAB recommendations for the development of Internet network management standards. RFC 1052, IETF, April 1988. URL: http://www.ietf.org/rfc/rfc1052.txt

72. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), Februar 1981.

73. Chokhani, S., W. Ford, R. Sabett, C. Merrill und S. Wu: Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. RFC 3647 (Informational), IETF, November 2003. URL: http://www.ietf.org/rfc/rfc3647.txt

74. Cid, D. B.: Os-Hids, Dezember 2004. URL: http://sourceforge.net/projects/ oshids/.

75. Cisco: TCP Intercept , 1998. URL: http://www.cisco.com/univercd/cc/td/ doc/product/software/ios112/intercpt.htm.

76. Clark, D.: IP datagram reassembly algorithms. RFC 815, IETF, Juli 1982. URL: http://www.ietf.org/rfc/rfc815.txt

77. Clarke, I.: The FreeNet Project Homepage, 2004. URL: http://www.freenetproject.org

78. Coltun, R., D. Ferguson und J. Moy: OSPF for IPv6. RFC 2740 (Proposed Standard), IETF, Dezember 1999. URL: http://www.ietf.org/rfc/rfc2740.txt

79. Cora, G. und L. Purdie: Snare, Dezember 2004. URL: http://sourceforge.net/projects/snare/

80. Cormen, T. H., C. E. Leiserson, R. L. Rivest und C. Stein: Introduction to Algorithms, Second Edition. The MIT Press, September 2001.

81. Corp., S. C. S.: Setec Partners with SSH Communications Security, 2002. URL: http://www.ssh.com/company/newsroom/article/85/

82. Courtois, N. T. und J. Pieprzyk: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Cryptology ePrint Archive: Report 2002/044, 2002. URL: http://eprint.iacr.org/2002/044.pdf

83. Crocker, D.: Standard for the format of ARPA Internet text messages. RFC 822 (Standard), IETF, August 1982. Obsolet durch RFC 2822, aktualisiert durch RFCs 1123, 1138, 1148, 1327, 2156. URL: http://www.ietf.org/rfc/rfc822.txt

84. Daemen, J. und V. Rijmen: The Design of Rijndael. The Wide Trail Strategy. Springer-Verlag Berlin Heidelberg, 1. Auflage, Dezember 2001.

85. Daigle, L. und IAB: IAB Considerations for UNilateral Self-Address Fixing (UNSAF) Across Network Address Translation. RFC 3424 (Informational), IETF, November 2002. URL: http://www.ietf.org/rfc/rfc3424.txt

86. Dalal, M.: Transmission Control Protocol Security Considerations. Internet- Draft draft-ietf-tcpm-tcpsecure-02.txt, November 2004. Arbeitsdokument der IETF.

87. Davies, D. W. und G. I. Parkin: The Average Size of the Key Stream in Output Feedback Encipherment. In: Proceedings of the Workshop on Cryptography 1982, S. 263--279. Springer-Verlag, März 1982.

88. Davin, J., J. Galvin und K. McCloghrie: SNMP Administrative Model . RFC 1351 (Historic), IETF, Juli 1992. URL: http://www.ietf.org/rfc/rfc1351.txt

89. Dayan, Y. und S. Bitan: IKE Base Mode. Internet-Draft -- draft-ietf-ipsecike-base-mode-03.txt, IETF, Januar 2000. Arbeitsdokument der IETF.

90. Deering, S.: Host extensions for IP multicasting. RFC 1112 (Standard), IETF, August 1989. Aktualisiert durch RFC 2236. URL: http://www.ietf.org/rfc/rfc1112.txt

91. Deering, S.: ICMP Router Discovery Messages. RFC 1256 (Proposed Standard), IETF, September 1991. URL: http://www.ietf.org/rfc/rfc1256.txt

92. Departmant of Defense: SKIPJACK and KEA Algorithm Specifications Version 2.0. Technischer Bericht, Department of Defence, Mai 1998. URL: http://www.jya.com/skipjack-spec.htm

93. Deutsch, P.: DEFLATE Compressed Data Format Specification version 1.3. RFC 1951 (Informational), IETF, Mai 1996. URL: http://www.ietf.org/rfc/rfc1951.txt

94. Deutsch, P. und J.-L. Gailly: ZLIB Compressed Data Format Specification version 3.3. RFC 1950 (Informational), IETF, Mai 1996. URL: http://www.ietf.org/rfc/rfc1950.txt

95. Devine, C.: Aircrack Documentation, April 2005. URL: http://www.cr0.net:8040/code/network/aircrack/

96. Dierks, T. und C. Allen: The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard), IETF, Januar 1999. Aktualisiert durch RFC 3546. URL: http://www.ietf.org/rfc/rfc2246.txt

97. Diffie, W. und M. E. Hellman: New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22(6):644--654, November 1976.

98. Diffie, W., P. C. V. Oorschot und M. J. Wiener: Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2(2):107--125, Juni 1992.

99. Diham, E. und A. Shamir: Differential Cryptanalysis of the Data Encryption Standard. Springer, 1993.

100. distributed.net: Projekt RC5, November 2004. URL: http://www.distributed.net/rc5/

101. Dobbertin, H.: Cryptanalysis of MD4. Journal of Cryptology, S. 253--274, 1998.

102. Droms, R.: Dynamic Host Configuration Protocol. RFC 2131 (Draft Standard), IETF, März 1997. Aktualisiert durch RFC 3396. URL: http://www.ietf.org/rfc/rfc2131.txt

103. Durham, D., J. Boyle, R. Cohen, S. Herzog, R. Rajan und A. Sastry: The COPS (Common Open Policy Service) Protocol. RFC 2748 (Proposed Standard), IETF, Januar 2000. URL: http://www.ietf.org/rfc/rfc2748.txt

104. Dworkin, M.: Recommendation for Block Cipher Modes of Operation, 2001. NIST Special Publication 800-38A.

105. Eastlake 3rd, D.: Secure Domain Name System Dynamic Update. RFC 2137 (Proposed Standard), IETF, April 1997. Obsolet durch RFC 3007. URL: http://www.ietf.org/rfc/rfc2137.txt

106. Eastlake 3rd, D.: Domain Name System Security Extensions. RFC 2535 (Proposed Standard), IETF, März 1999. Obsolet durch RFCs 4033, 4034, 4035, aktualisiert durch RFCs 2931, 3007, 3008, 3090, 3226, 3445, 3597, 3655, 3658, 3755, 3757, 3845. URL: http://www.ietf.org/rfc/rfc2535.txt

107. Elkins, M., D. D. Torto, R. Levien und T. Roessler: MIME Security with OpenPGP. RFC 3156 (Proposed Standard), IETF, August 2001. URL: http://www.ietf.org/rfc/rfc3156.txt

108. Ellison, C., B. Frantz, B. Lampson, R. Rivest, B. Thomas und T. Ylonen: SPKI Certificate Theory. RFC 2693 (Experimental), IETF, September 1999. URL: http://www.ietf.org/rfc/rfc2693.txt

109. Endres, J.: Salto rückwärts -- VPN mit den Mitteln der Trojaner. C't -- Magazin für Computertechnik, 22(7), 2004.

110. Ertel, W. und E. Schreck: Real Random Numbers produced by a Maxtor Disk Drive, Oktober 2000. URL: http://erde.fbe.fh-weingarten.de/ertel/rrng/docu.pdf

111. Farrell, S. und R. Housley: An Internet Attribute Certificate Profile for Authorization. RFC 3281 (Proposed Standard), IETF, April 2002. URL: http://www.ietf.org/rfc/rfc3281.txt

112. Farrell, S., J. Vollbrecht, P. Calhoun, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege und D. Spence: AAA Authorization Requirements. RFC 2906 (Informational), IETF, August 2000. URL: http://www.ietf.org/rfc/rfc2906.txt

113. Feistel, H.: Cryptography and Computer Privacy. Scientific American, S. 15--23, Mai 1973.

114. Ferguson, N. und B. Schneier: A Cryptographic Evaluation of IPsec, Februar 1999. URL: http://www.counterpane.com/ipsec.{pdf,ps,zip}

115. Ferguson, P. und D. Senie: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827 (Best Current Practice), IETF, Mai 2000. Aktualisiert durch RFC 3704. URL: http://www.ietf.org/rfc/rfc2827.txt

116. Fiat, A. und A. Shamir: How to prove yourself: Practical solutions to identification and signature problems. In: Advances in Cryptology -- Crypto '86, 1987.

117. Fielding, R., J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach und T. Berners-Lee: Hypertext Transfer Protocol -- HTTP/1.1. RFC 2616 (Draft Standard), IETF, Juni 1999. Aktualisiert durch RFC 2817. URL: http://www.ietf.org/rfc/rfc2616.txt

118. Finseth, C.: An Access Control Protocol, Sometimes Called TACACS. RFC 1492 (Informational), IETF, Juli 1993. URL: http://www.ietf.org/rfc/rfc1492.txt

119. Fluhrer, S., I. Mantin und A. Shamir: Weaknesses in the Key Scheduling Algorithm of RC4. Lecture Notes in Computer Science, 2259:1--24, 2001.

120. Fluhrer, S. R. und S. Lucks: Analysis of the E0 Encryption System. Advances in Cryptology: Proceedings of Crypto 82, S. 99--127, 1983.

121. Fluhrer, S. R. und S. Lucks: Analysis of the E0 Encryption System. Selected Areas in Cryptography, August 2001.

122. Forsberg, D., Y. Ohba, B. Patil, H. Tschofenig und A. Yegin: Protocol for Carrying Authentication for Network Access (PANA). Internet-Draft -- draft-ietf-pana-pana-07.txt, IETF, Dezember 2004. Arbeitsdokument der IETF.

123. Foundation, E. F.: Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. O'Reilly, 1. Auflage, Mai 1998.

124. Fox, A. und E. A. Brewer: Harvest, Yield and Scalable Tolerant Systems. In: Workshop on Hot Topics in Operating Systems, S. 174--178, 1999. URL: http://citeseer.ist.psu.edu/fox99harvest.html

125. Fox, D.: Bluetooth Security Secorvo White Paper. Technischer Bericht, Secorvo Security Consulting GmbH, September 2002.

126. Frankel, S., R. Glenn und S. Kelly: The AES-CBC Cipher Algorithm and Its Use with IPsec. RFC 3602 (Proposed Standard), IETF, September 2003. URL: http://www.ietf.org/rfc/rfc3602.txt

127. Franks, J., P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen und L. Stewart: HTTP Authentication: Basic and Digest Access Authentication. RFC 2617 (Draft Standard), IETF, Juni 1999. URL: http://www.ietf.org/rfc/rfc2617.txt

128. Fraser, B.: Site Security Handbook. RFC 2196 (Informational), IETF, September 1997. URL: http://www.ietf.org/rfc/rfc2196.txt

129. Freed, N. und N. Borenstein: Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Examples. RFC 2049 (Draft Standard), IETF, November 1996. URL: http://www.ietf.org/rfc/rfc2049.txt

130. Freed, N. und N. Borenstein: Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies. RFC 2045 (Draft Standard), IETF, November 1996. Aktualisiert durch RFCs 2184, 2231. URL: http://www.ietf.org/rfc/rfc2045.txt

131. Freed, N. und N. Borenstein: Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types. RFC 2046 (Draft Standard), IETF, November 1996. Aktualisiert durch RFCs 2646, 3798. URL: http://www.ietf.org/rfc/rfc2046.txt

132. Friend, R.: Transport Layer Security (TLS) Protocol Compression Using Lempel-Ziv-Stac (LZS). RFC 3943 (Informational), IETF, November 2004. URL: http://www.ietf.org/rfc/rfc3943.txt

133. Funk, P. und S. Blake-Wilson: EAP Tunneled TLS Authentication Protocol (EAP-TTLS). Internet-Draft -- draft-ietf-pppext-eap-ttls-05.txt, IETF, Juli 2004. Arbeitsdokument der IETF.

134. Gait, J.: A New Nonlinear Pseudorandom Number Generator. In: IEEE Transactions on Software Engineering, Nr. 5 in 3, S. 359--363. IEEE, September 1977.

135. Galvin, J., K. McCloghrie und J. Davin: SNMP Security Protocols. RFC 1352 (Historic), IETF, Juli 1992. URL: http://www.ietf.org/rfc/rfc1352.txt

136. Gamal, T. E.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Proceedings of CRYPTO 84 on Advances in cryptology, Juli 1985.

137. Gambetta, D.: Can we Trust Trust?. In: Trust: Making and Breaking Cooperative Relations, S. 213--237, 1988.

138. Geiselmann, W. und R. Steinwandt: Yet Another Sieving Device. In: CTRSA 2004, LNCS 2964, S. 278--291. Springer-Verlag, Februar 2004. URL: http://eprint.iacr.org/2003/202.pdf

139. Goldwasser, S., S. Micali und R. L. Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal on Computing, 17(2), 1988.

140. Goodell, G., W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel und A. Rubin: Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. In: Proceedings of Network and Distributed System Security Symposium, San Diego, CA, Februar 2003.

141. Gutmann, P.: Linux's answer to MS-PPTP, September 2003. URL: http://www.cs.auckland.ac.nz/~pgut001/pubs/linux vpn.txt

142. Guttman, E., L. Leong und G. Malkin: Users' Security Handbook. RFC 2504 (Informational), IETF, Februar 1999. URL: http://www.ietf.org/rfc/rfc2504.txt

143. Guttman, E., C. Perkins, J. Veizades und M. Day: Service Location Protocol, Version 2. RFC 2608 (Proposed Standard), IETF, Juni 1999. Aktualisiert durch RFC 3224. URL: http://www.ietf.org/rfc/rfc2608.txt

144. Hain, T.: Architectural Implications of NAT. RFC 2993 (Informational), IETF, November 2000. URL: http://www.ietf.org/rfc/rfc2993.txt

145. Haller, N., C. Metz, P. Nesser und M. Straw: A One-Time Password System. RFC 2289 (Standard), IETF, Februar 1998. URL: http://www.ietf.org/rfc/rfc2289.txt

146. Hamzeh, K., G. Pall, W. Verthein, J. Taarud, W. Little und G. Zorn: Point-to-Point Tunneling Protocol. RFC 2637 (Informational), IETF, Juli 1999. URL: http://www.ietf.org/rfc/rfc2637.txt

147. Handley, M. und V. Jacobson: SDP: Session Description Protocol. RFC 2327 (Proposed Standard), IETF, April 1998. Aktualisiert durch RFC 3266. URL: http://www.ietf.org/rfc/rfc2327.txt

148. Hanks, S., T. Li, D. Farinacci und P. Traina: Generic Routing Encapsulation (GRE). RFC 1701 (Informational), IETF, Oktober 1994. URL: http://www.ietf.org/rfc/rfc1701.txt

149. Harkins, D. und D. Carrel: The Internet Key Exchange (IKE). RFC 2409 (Proposed Standard), IETF, November 1998. URL: http://www.ietf.org/rfc/rfc2409.txt

150. Harrington, D., R. Presuhn und B. Wijnen: An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks. RFC 3411 (Standard), IETF, Dezember 2002. URL: http://www.ietf.org/rfc/rfc3411.txt

151. Heffernan, A.: Protection of BGP Sessions via the TCP MD5 Signature Option. RFC 2385 (Proposed Standard), IETF, August 1998. URL: http://www.ietf.org/rfc/rfc2385.txt

152. Heise: Sicherheitslücken gefährden Bluetooth-Handys, November 2003. URL: http://www.heise.de/security/news/meldung/41980

153. Heise: Terroristen verstecken Botschaften angeblich in IP-Headern, März 2003. URL: http://www.heise.de/newsticker/meldung/35137

154. Heise: Bagle.AF funktioniert Windows-PCs zu Spam-Relays um, März 2004. URL: http://www.heise.de/security/news/meldung/49143

155. Heise: Bluetooth-Handys ferngesteuert, März 2004. URL: http://www.heise.de/newsticker/meldung/46097

156. Heise: Weitere Bluetooth-Handys gegen Hacker-Angriffe anfällig, Mai 2004. URL: http://www.heise.de/security/news/meldung/47285

157. Herfurt, M., J. Hering, J. Burgess, K. Mahaffey und M. Outmesguine: Long Distance Snarf , 2004. URL: http://trifinite.org/trifinite stuff.html

158. Herzog, S., J. Boyle, R. Cohen, D. Durham, R. Rajan und A. Sastry: COPS usage for RSVP. RFC 2749 (Proposed Standard), IETF, Januar 2000. URL: http://www.ietf.org/rfc/rfc2749.txt

159. Hill, J.: An Analysis of the RADIUS Authentication Protocol , November 2001. URL: http://www.untruth.org/~josh/security/radius/radius-auth.html

160. Hodges, J. und R. Morgan: Lightweight Directory Access Protocol (v3): Technical Specification. RFC 3377 (Proposed Standard), IETF, September 2002. URL: http://www.ietf.org/rfc/rfc3377.txt

161. Hollenbeck, S.: Transport Layer Security Protocol Compression Methods. RFC 3749 (Proposed Standard), IETF, Mai 2004. URL: http://www.ietf.org/rfc/rfc3749.txt

162. Housley, R.: Cryptographic Message Syntax (CMS). RFC 3369 (Proposed Standard), IETF, August 2002. Obsolet durch RFC 3852. URL: http://www.ietf.org/rfc/rfc3369.txt

163. Housley, R., W. Ford, W. Polk und D. Solo: Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 2459 (Proposed Standard), IETF, Januar 1999. Obsolet durch RFC 3280. URL: http://www.ietf.org/rfc/rfc2459.txt

164. Housley, R., W. Polk, W. Ford und D. Solo: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (Proposed Standard), IETF, April 2002. URL: http://www.ietf.org/rfc/rfc3280.txt

165. Hovey, R. und S. Bradner: The Organizations Involved in the IETF Standards Process. RFC 2028 (Best Current Practice), IETF, Oktober 1996. Aktualisiert durch RFCs 3668, 3979. URL: http://www.ietf.org/rfc/rfc2028.txt

166. Huitema, C. und B. Carpenter: Deprecating Site Local Addresses. RFC 3879 (Proposed Standard), IETF, September 2004. URL: http://www.ietf.org/rfc/rfc3879.txt

167. Huttunen, A., B. Swander, V. Volpe, L. DiBurro und M. Stenberg: UDP Encapsulation of IPsec ESP Packets. RFC 3948 (Proposed Standard), IETF, Januar 2005. URL: http://www.ietf.org/rfc/rfc3948.txt

168. IANA: Well Known Port Numbers, 2005. URL: http://www.iana.org/assignments/port-numbers

169. IBM Corp.: AFS User Guide, April 2000. URL: http://www-306.ibm.com/software/stormgmt/afs/manuals/Library/ unix/en US/PDF/UserGd/auusg000.pdf.

170. ICQ.com: The ICQ Story, Januar 2005. URL: http://company.icq.com/info/icqstory.html

171. Institute of Electrical and Electronics Engineers: IEEE Standards for Local and Metropolitan Area Networks: Virtual Bridged Local Area Networks. IEEE Std 802.1Q-2003, Mai 2003. URL: http://standards.ieee.org/getieee802/download/802.1Q-2003.pdf

172. Institute of Electrical and Electronics Engineers: IEEE Standards for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges. IEEE Std 802.3D-2004, Juni 2004. URL: http://standards.ieee.org/getieee802/download/802.3D-2004.pdf

173. Intel Corporation: The Intel Random Number Generator, 1999. URL: http://citeseer.ist.psu.edu/435839.html

174. International Organisation for Standardization: Banking -- Key Management (Wholesale), 1988. ISO 8732.

175. International Telecommunication Union -- Telecommunication Standardization Sector (ITU-T) / International Organisation for Standardization: Q.700: Introduction to CCITT Signalling System No. 7, März 1993.

176. International Telecommunication Union -- Telecommunication Standardization Sector (ITU-T) / International Organisation for Standardization: Information technology -- Open Systems Interconnection -- Basic reference model: The basic model , Juli 1994. Recommendation X.200, identisch mit ISO-Norm ISO/IEC 7498-1:1994.

177. International Telecommunication Union -- Telecommunication Standardization Sector (ITU-T) / International Organisation for Standardization: X.500: Overview of Concepts, Models, and Services, ITU-T Rec. X.500 (1993) | ISO/IEC 9594-1:1993, Februar 2001.

178. International Telecommunication Union -- Telecommunication Standardization Sector (ITU-T) / International Organisation for Standardization: ITU-T Recommendation X.680: Information Technology - Abstract Syntax Notation One (ASN.1): Specification of Basic Notation, Juli 2002. Recommendation X.680 (2002), identisch mit ISO-Norm ISO/IEC 8824- 1:2002.

179. International Telecommunication Union -- Telecommunication Standardization Sector (ITU-T) / International Organisation for Standardization: ITU-T Recommendation X.690: Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER), Juli 2002. Recommendation X.680 (2002), identisch mit ISO-Norm ISO/IEC 8825-1.

180. International Telecommunication Union -- Telecommunication Standardization Sector (ITU-T) / International Organisation for Standardization: H.323: Packet based multimedia communication system., Juli 2003.

181. International Telecommunication Union -- Telecommunication Standardization Sector (ITU-T) / International Organisation for Standardization: X.509: Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks, März 2003.

182. Jamoussi, B., L. Andersson, R. Callon, R. Dantu, L. Wu, P. Doolan, T. Worster, N. Feldman, A. Fredette, M. Girish, E. Gray, J. Heinanen, T. Kilty und A. Malis: Constraint-Based LSP Setup using LDP. RFC 3212 (Proposed Standard), IETF, Januar 2002. Aktualisiert durch RFC 3468. URL: http://www.ietf.org/rfc/rfc3212.txt

183. Johns, M. S., G. Huston und IAB: Considerations on the use of a Service Identifier in Packet Headers. RFC 3639 (Informational), IETF, Oktober 2003. URL: http://www.ietf.org/rfc/rfc3639.txt

184. Johnson, D.: ECC, Future Resiliency and High Security Systems. Technischer Bericht, Certicom, 1999.

185. Johnson, D., C. Perkins und J. Arkko: Mobility Support in IPv6. RFC 3775 (Proposed Standard), IETF, Juni 2004. URL: http://www.ietf.org/rfc/rfc3775.txt

186. Johnston, P.: Paj's Hom: JavaScript MD5, Dezember 2004. URL: http://pajhome.org.uk/crypt/md5/

187. Jonceray, L.: A Simple Active Attack Against TCP, April 1995. URL: http://www.deter.com/unix/papers/tcp attack.ps.gz

188. Jones, G.: Operational Security Requirements for Large Internet Service Provider (ISP) IP Network Infrastructure. RFC 3871 (Informational), IETF, September 2004. URL: http://www.ietf.org/rfc/rfc3871.txt

189. Josefsson, S.: DNSsec Walker, 2004. URL: http://josefsson.org/walker/

190. Josefsson, S., A. Palekar, D. Simon, G. Zorn und H. Andersson: Protected EAP Protocol (PEAP) Version 2. Internet-Draft -- draft-josefsson-pppexteap- tls-eap-10.txt, IETF, Oktober 2004. Arbeitsdokument der IETF.

191. Jungmaier, A., E. Rescorla und M. Tuexen: Transport Layer Security over Stream Control Transmission Protocol. RFC 3436 (Proposed Standard), IETF, Dezember 2002. URL: http://www.ietf.org/rfc/rfc3436.txt

192. Kahn, D.: The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner, 2. Auflage, Dezember 1996.

193. Kaliski, B.: Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services. RFC 1424 (Proposed Standard), IETF, Februar 1993. URL: http://www.ietf.org/rfc/rfc1424.txt

194. Kalt, C.: Internet Relay Chat: Architecture. RFC 2810 (Informational), IETF, April 2000. URL: http://www.ietf.org/rfc/rfc2810.txt

195. Kalt, C.: Internet Relay Chat: Channel Management. RFC 2811 (Informational), IETF, April 2000. URL: http://www.ietf.org/rfc/rfc2811.txt

196. Kalt, C.: Internet Relay Chat: Client Protocol. RFC 2812 (Informational), IETF, April 2000. URL: http://www.ietf.org/rfc/rfc2812.txt

197. Kalt, C.: Internet Relay Chat: Server Protocol. RFC 2813 (Informational), IETF, April 2000. URL: http://www.ietf.org/rfc/rfc2813.txt

198. Karn, P. und W. Simpson: Photuris: Session-Key Management Protocol . RFC 2522 (Experimental), IETF, März 1999. URL: http://www.ietf.org/rfc/rfc2522.txt

199. Kastenholz, F.: SNMP Communications Services. RFC 1270 (Informational), IETF, Oktober 1991. URL: http://www.ietf.org/rfc/rfc1270.txt

200. Kaufman (Editor), C.: Internet Key Exchange (IKEv2) Protocol. Internet- Draft -- draft-ietf-ipsec-ikev2-17.txt, IETF, September 2004. Arbeitsdokument der IETF.

201. Kent, S.: Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management. RFC 1422 (Proposed Standard), IETF, Februar 1993. URL: http://www.ietf.org/rfc/rfc1422.txt

202. Kent, S. und R. Atkinson: IP Authentication Header. RFC 2402 (Proposed Standard), IETF, November 1998. URL: http://www.ietf.org/rfc/rfc2402.txt

203. Kent, S. und R. Atkinson: IP Encapsulating Security Payload (ESP). RFC 2406 (Proposed Standard), IETF, November 1998. URL: http://www.ietf.org/rfc/rfc2406.txt

204. Kent, S. und R. Atkinson: Security Architecture for the Internet Protocol . RFC 2401 (Proposed Standard), IETF, November 1998. Aktualisiert durch RFC 3168. URL: http://www.ietf.org/rfc/rfc2401.txt

205. Kent, S., C. Lynn und K. Seo: Secure Border Gateway Protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 18(4):582--592, 2000.

206. Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences Militaires, 9:5--38, 1883.

207. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation, Vol. 48, S. 203--209, 1987.

208. Koblitz, N.: A Course in Number Theory and Cryptography. Springer, 2. Auflage, Januar 1994.

209. Kocher, P.: Timing Attacks on Implementation of Diffie-Hellman, RSA, DSS, and other Systems. In: Advances in Cryptology -- CRYPTO'96, LNCS 1109, S. 104--113. Springer-Verlag, 1996.

210. Kohler, E., M. Handley und S. Floyd: Datagram Congestion Control Protocol (DCCP). Internet-Draft draft-ietf-dccp-spec-11.txt, März 2005. Arbeitsdokument der IETF.

211. Krawczyk, H., M. Bellare und R. Canetti: HMAC: Keyed-Hashing for Message Authentication. RFC 2104 (Informational), IETF, Februar 1997. URL: http://www.ietf.org/rfc/rfc2104.txt

212. Krzywinski, M.: Port Knocking: Network Authentication Across Closed Ports. SysAdmin Magazine, 12(6):12--17, Juni 2003. URL: http://www.samag.com/articles/2003/0306/

213. Krzywinski, M.: Port Knocking -- A system for stealthy authentication across closed ports, Januar 2005. URL: http://www.portknocking.org/

214. Kügler, D.: Man in the Middle Attacks on Bluetooth. In: Financial Cryptography 2003, Januar 2003.

215. Laat, C. de, G. Gross, L. Gommans, J. Vollbrecht und D. Spence: Generic AAA Architecture. RFC 2903 (Experimental), IETF, August 2000. URL: http://www.ietf.org/rfc/rfc2903.txt

216. Lai, X.: On the Design and Security of Block Ciphers. ETH Series in Information Processing, 1, 1992.

217. Leach, J. und G. Tedesco: Firestorm Network Intrusion Detection System, Dezember 2004. URL: http://www.scaramanga.co.uk/firestrom/

218. Leach, P., C. Newman und A. Melnikov: Using Digest Authentication as a SASL Mechanism. Internet-Draft -- draft-ietf-sasl-rfc2831bis-04.txt, IETF, September 2004. Arbeitsdokument der IETF.

219. Leech, M.: Key Management Considerations for the TCP MD5 Signature Option. RFC 3562 (Informational), IETF, Juli 2003. URL: http://www.ietf.org/rfc/rfc3562.txt

220. Leech, M., M. Ganis, Y. Lee, R. Kuris, D. Koblas und L. Jones: SOCKS Protocol Version 5. RFC 1928 (Proposed Standard), IETF, März 1996. URL: http://www.ietf.org/rfc/rfc1928.txt

221. Lenstra, A., X. Wang und B. de Weger: Colliding X.509 Certificates. Cryptology ePrint Archive: Report 2005/067, März 2005. URL: http://eprint.iacr.org/2005/067

222. Lenstra, A. K. und E. R. Verheul: Selecting Cryptographic Key Sizes. Journal of Cryptology: the journal of the International Association for Cryptologic Research, 14(4):255--293, 2001.

223. Levi, D., P. Meyer und B. Stewart: Simple Network Management Protocol (SNMP) Applications. RFC 3413 (Standard), IETF, Dezember 2002. URL: http://www.ietf.org/rfc/rfc3413.txt

224. Li, T. und R. Atkinson: Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication. RFC 3567 (Informational), IETF, Juli 2003. URL: http://www.ietf.org/rfc/rfc3567.txt

225. Li, T., B. Cole, P. Morton und D. Li: Cisco Hot Standby Router Protocol (HSRP). RFC 2281 (Informational), IETF, März 1998. URL: http://www.ietf.org/rfc/rfc2281.txt

226. Lim, C. H. und P. J. Lee: A Key Recovery Attack on Discrete Log-Based Schemes Using a Prime Order Subgroup. In: Advances in Cryptology -- CRYPTO' 97, LNCS 1294, S. 249--263, 1997.

227. Linn, J.: Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures. RFC 1421 (Proposed Standard), IETF, Februar 1993. URL: http://www.ietf.org/rfc/rfc1421.txt

228. Linn, J.: Generic Security Service Application Program Interface Version 2, Update 1. RFC 2743 (Proposed Standard), IETF, Januar 2000. URL: http://www.ietf.org/rfc/rfc2743.txt

229. Lloyd, S.: CA-CA Interoperability. PKI Forum, März 2001.

230. Lucks, S.: Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys. In: AES3: The Third Advanced Encryption Standard Candidate, 2000.

231. Madson, C. und N. Doraswamy: The ESP DES-CBC Cipher Algorithm With Explicit IV. RFC 2405 (Proposed Standard), IETF, November 1998. URL: http://www.ietf.org/rfc/rfc2405.txt

232. Madson, C. und R. Glenn: The Use of HMAC-MD5-96 within ESP and AH. RFC 2403 (Proposed Standard), IETF, November 1998. URL: http://www.ietf.org/rfc/rfc2403.txt

233. Madson, C. und R. Glenn: The Use of HMAC-SHA-1-96 within ESP and AH. RFC 2404 (Proposed Standard), IETF, November 1998. URL: http://www.ietf.org/rfc/rfc2404.txt

234. Malkin, G.: RIP Version 2. RFC 2453 (Standard), IETF, November 1998. URL: http://www.ietf.org/rfc/rfc2453.txt

235. Mamakos, L., K. Lidl, J. Evarts, D. Carrel, D. Simone und R. Wheeler: A Method for Transmitting PPP Over Ethernet (PPPoE). RFC 2516 (Informational), IETF, Februar 1999. URL: http://www.ietf.org/rfc/rfc2516.txt

236. Marsaglia, G. und W. W. Tsang: Some difficult-to-pass tests of randomness. Journal of Statistical Software, 2002.

237. Matsui, M.: Linear Cryptanalysis Method for DES Cipher. Advances in Cryptology -- EUROCRYPT, 1993.

238. Maughan, D., M. Schertler, M. Schneider und J. Turner: Internet Security Association and Key Management Protocol (ISAKMP). RFC 2408 (Proposed Standard), IETF, November 1998. URL: http://www.ietf.org/rfc/rfc2408.txt

239. Maurer, U. M. und S. Wolf: The Relationship Between Breaking the Diffie- Hellman Protocol and Computing Discrete Logarithms. SIAM Journal on Computing, 28(5):1689--1721, 1999.

240. McCloghrie, K. und M. Rose: Structure and identification of management information for TCP/IP-based internets. RFC 1065 (Standard), IETF, August 1988. Obsolet durch RFC 1155. URL: http://www.ietf.org/rfc/rfc1065.txt

241. McCloghrie, K. und M. Rose: Management Information Base for network management of TCP/IP-based internets. RFC 1156 (Historic), IETF, Mai 1990. URL: http://www.ietf.org/rfc/rfc1156.txt

242. McDonald, D., C. Metz und B. Phan: PF KEY Key Management API, Version 2. RFC 2367 (Informational), IETF, Juli 1998. URL: http://www.ietf.org/rfc/rfc2367.txt

243. Medvinsky, A. und M. Hur: Addition of Kerberos Cipher Suites to Transport Layer Security (TLS). RFC 2712 (Proposed Standard), IETF, Oktober 1999. URL: http://www.ietf.org/rfc/rfc2712.txt

244. Melnikov, A.: SASL GSSAPI mechanisms. Internet-Draft -- draft-ietf-saslgssapi- 02.txt, IETF, März 2005. Arbeitsdokument der IETF.

245. Melnikov, A.: Simple Authentication and Security Layer (SASL). Internet- Draft -- draft-ietf-sasl-rfc2222bis-10.txt, IETF, Februar 2005. Arbeitsdokument der IETF.

246. Menezes, A., P. van Oorschot und S. Vanstone: Handbook of Applied Cryptography. CRC Press, Oktober 1996.

247. Merkle, R.: Secure communication over insecure channels. Communications of the ACM, April 1978.

248. Miller, I.: Protection Against a Variant of the Tiny Fragment Attack (RFC 1858). RFC 3128 (Informational), IETF, Juni 2001. URL: http://www.ietf.org/rfc/rfc3128.txt

249. Miller, R.: A peek at script kiddie culture, 2004. URL: http://software.newsforge.com/software/04/02/28/0130209.shtml

250. Miller, V. S.: Use of elliptic curves in cryptography. In: Advances in cryptology CRYPTO 85, 1986.

251. Mills, D.: Network Time Protocol (Version 3) Specification, Implementation. RFC 1305 (Draft Standard), IETF, März 1992. URL: http://www.ietf.org/rfc/rfc1305.txt

252. Milner, M.: Netstumbler Entwickler-Homepage und Diskussionsforum, Dezember 2004. URL: http://stumbler.net

253. Mitnick, K. D., W. L. Simon und S. Wozniak: The Art of Deception. Wiley, 1. Auflage, Oktober 2002.

254. Mockapetris, P.: Domain names - concepts and facilities. RFC 1034 (Standard), IETF, November 1987. Aktualisiert durch RFCs 1101, 1183, 1348, 1876, 1982, 2065, 2181, 2308, 2535, 4033, 4034, 4035. URL: http://www.ietf.org/rfc/rfc1034.txt

255. Mockapetris, P.: Domain names - implementation and specification. RFC 1035 (Standard), IETF, November 1987. Aktualisiert durch RFCs 1101, 1183, 1348, 1876, 1982, 1995, 1996, 2065, 2136, 2181, 2137, 2308, 2535, 2845, 3425, 3658, 4033, 4034, 4035. URL: http://www.ietf.org/rfc/rfc1035.txt

256. Moeller, B.: Export-PKC attacks on SSL 3.0/TLS 1.0, 1998. URL: http://www.imc.org/ietf-tls/mail-archive/msg01671.html

257. Moen, V., H.Raddum und K. Hole: Weaknesses in the Temporal Key Hash of WPA. Mobile Computing and Communication Review, 2004.

258. Mogul, J. und S. Deering: Path MTU discovery. RFC 1191 (Draft Standard), IETF, November 1990. URL: http://www.ietf.org/rfc/rfc1191.txt

259. Mogul, J. C., R. Fielding, J. Gettys und H. Frystyk: Use and Interpretation of HTTP Version Numbers. RFC 2145 (Informational), IETF, Mai 1997. URL: http://www.ietf.org/rfc/rfc2145.txt

260. Moor, G. E.: Cramming more components onto integrated circuits. Electronics, 38(8), April 1965.

261. Moore, D., V. Paxson, S. Savage, C. Shannon, S. Staniford und N. Weaver: The Spread of the Sapphire/Slammer Worm, 2003. URL: http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html

262. Moore, K.: MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text. RFC 2047 (Draft Standard), IETF, November 1996. Aktualisiert durch RFCs 2184, 2231. URL: http://www.ietf.org/rfc/rfc2047.txt

263. Morgenstern, J.: WaveMon Entwickler-Homepage bei Freshmeat , Dezember 2004. URL: http://freshmeat.net/projects/wavemon

264. Moy, J.: OSPF Version 2. RFC 2328 (Standard), IETF, April 1998. URL: http://www.ietf.org/rfc/rfc2328.txt

265. Myers, J.: Simple Authentication and Security Layer (SASL). RFC 2222 (Proposed Standard), IETF, Oktober 1997. Aktualisiert durch RFC 2444. URL: http://www.ietf.org/rfc/rfc2222.txt

266. Myers, J. und M. Rose: Post Office Protocol - Version 3. RFC 1939 (Standard), IETF, Mai 1996. Aktualisiert durch RFCs 1957, 2449. URL: http://www.ietf.org/rfc/rfc1939.txt

267. Myers, M., R. Ankney, A. Malpani, S. Galperin und C. Adams: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 2560 (Proposed Standard), IETF, Juni 1999. URL: http://www.ietf.org/rfc/rfc2560.txt

268. Narten, T. und R. Draves: Privacy Extensions for Stateless Address Autoconfiguration in IPv6. RFC 3041 (Proposed Standard), IETF, Januar 2001. URL: http://www.ietf.org/rfc/rfc3041.txt

269. Narten, T., E. Nordmark und W. Simpson: Neighbor Discovery for IP Version 6 (IPv6). RFC 2461 (Draft Standard), IETF, Dezember 1998. URL: http://www.ietf.org/rfc/rfc2461.txt

270. National Institute of Standards and Technology: Federal Information Processing Standards Publication 186 -- Digital Signature Standard (DSS), Mai 1994.

271. National Institute of Standards and Technology: Federal Information Processing Standards Publication 186 -- Digital Signature Standard (DSS), Mai 1994.

272. National Institute of Standards and Technology: Federal Information Processing Standards Publication 180-1 -- Secure Hash Standard, April 1995.

273. National Institute of Standards and Technology: Federal Information Processing Standards Publication 197 -- Advanced Encryption Standard (AES), November 2001.

274. Nerenberg, L.: The CRAM-MD5 SASL Mechanism. Internet-Draft -- draftietf- sasl-crammd5-04.txt, IETF, Oktober 2004. Arbeitsdokument der IETF.

275. Newman, C.: The One-Time-Password SASL Mechanism. RFC 2444 (Proposed Standard), IETF, Oktober 1998. URL: http://www.ietf.org/rfc/rfc2444.txt

276. Nichols, K., S. Blake, F. Baker und D. Black: Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC 2474 (Proposed Standard), IETF, Dezember 1998. Aktualisiert durch RFCs 3168, 3260. URL: http://www.ietf.org/rfc/rfc2474.txt

277. Ohta, H. und M. Matsui: A Description of the MISTY1 Encryption Algorithm. RFC 2994 (Informational), IETF, November 2000. URL: http://www.ietf.org/rfc/rfc2994.txt

278. Omella, A. A. und D. Barroso: Yersinia Multi-attack Network Tool, April 2005. URL: http://sourceforge.net/projects/yersinia

279. One, A.: Smashing The Stack For Fun And Profit. Phrack, 20(49), 1996. URL: http://www.phrack.org/show.php?p=49&a=14

280. OpenBSD: Project History and Credits, 2005. URL: http://www.openssh.org/history.html

281. Orman, H. und P. Hoffman: Determining Strengths For Public Keys Used For Exchanging Symmetric Keys. RFC 3766 (Best Current Practice), IETF, April 2004. URL: http://www.ietf.org/rfc/rfc3766.txt

282. Ornaghi, A. und M. Valleri: ettercap, Dezember 2004. URL: http://ettercap.sourceforge.net

283. Patel, B., B. Aboba, W. Dixon, G. Zorn und S. Booth: Securing L2TP using IPsec. RFC 3193 (Proposed Standard), IETF, November 2001. URL: http://www.ietf.org/rfc/rfc3193.txt

284. Paxson, V.: An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. Computer Communications Review, 31(3), Juli 2001. ISSN 0146-4833.

285. Paxson, V.: Bro Intrusion Detection System, Dezember 2004. URL: http://www.bro-ids.org

286. Perkins, C.: IP Encapsulation within IP. RFC 2003 (Proposed Standard), IETF, Oktober 1996. URL: http://www.ietf.org/rfc/rfc2003.txt

287. Perkins, C.: IP Mobility Support for IPv4. RFC 3344 (Proposed Standard), IETF, August 2002. URL: http://www.ietf.org/rfc/rfc3344.txt

288. Perlman, R.: An Overview of PKI Trust Models. IEEE Network, 13(6):38--43, Dezember 1999.

289. Petrack, S. und L. Conroy: The PINT Service Protocol: Extensions to SIP and SDP for IP Access to Telephone Call Services. RFC 2848 (Proposed Standard), IETF, Juni 2000. URL: http://www.ietf.org/rfc/rfc2848.txt

290. Piper, D.: The Internet IP Security Domain of Interpretation for ISAKMP. RFC 2407 (Proposed Standard), IETF, November 1998. URL: http://www.ietf.org/rfc/rfc2407.txt

291. PKIX Working Group: Working Group Charter, Dezember 2004. URL: http://www.ietf.org/html.charters/pkix-charter.html

292. Plummer, D.: Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware. RFC 826 (Standard), IETF, November 1982. URL: http://www.ietf.org/rfc/rfc826.txt

293. Postel, J.: User Datagram Protocol. RFC 768 (Standard), IETF, August 1980. URL: http://www.ietf.org/rfc/rfc768.txt

294. Postel, J.: Internet Protocol. RFC 791 (Standard), IETF, September 1981. Aktualisiert durch RFC 1349. URL: http://www.ietf.org/rfc/rfc791.txt

295. Postel, J.: Simple Mail Transfer Protocol. RFC 788, IETF, November 1981. Obsolet durch RFC 821. URL: http://www.ietf.org/rfc/rfc788.txt

296. Postel, J.: Transmission Control Protocol. RFC 793 (Standard), IETF, September 1981. Aktualisiert durch RFC 3168. URL: http://www.ietf.org/rfc/rfc793.txt

297. Postel, J.: Simple Mail Transfer Protocol. RFC 821 (Standard), IETF, August 1982. Obsolet durch RFC 2821. URL: http://www.ietf.org/rfc/rfc821.txt

298. Postel, J. und J. Reynolds: Telnet Option Specifications. RFC 855 (Standard), IETF, Mai 1983. URL: http://www.ietf.org/rfc/rfc855.txt

299. Postel, J. und J. Reynolds: Telnet Protocol Specification. RFC 854 (Standard), IETF, Mai 1983. URL: http://www.ietf.org/rfc/rfc854.txt

300. Presuhn, R.: Transport Mappings for the Simple Network Management Protocol (SNMP). RFC 3417 (Standard), IETF, Dezember 2002. URL: http://www.ietf.org/rfc/rfc3417.txt

301. Presuhn, R.: Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP). RFC 3416 (Standard), IETF, Dezember 2002. URL: http://www.ietf.org/rfc/rfc3416.txt

302. Rager, A.: WEPCrack Entwickler-Homepage bei Sourceforge, Dezember 2004. URL: http://wepcrack.sourceforge.net

303. Ramsdell, B.: S/MIME Version 3 Message Specification. RFC 2633 (Proposed Standard), IETF, Juni 1999. Obsolet durch RFC 3851. URL: http://www.ietf.org/rfc/rfc2633.txt

304. Reiter, M. K. und A. D. Rubin: Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security (TISSEC), S. 62--92, November 1998.

305. Rekhter, Y. und T. Li: A Border Gateway Protocol 4 (BGP-4). RFC 1771 (Draft Standard), IETF, März 1995. URL: http://www.ietf.org/rfc/rfc1771.txt

306. Rekhter, Y., B. Moskowitz, D. Karrenberg, G. J. de Groot und E. Lear: Address Allocation for Private Internets. RFC 1918 (Best Current Practice), IETF, Februar 1996. URL: http://www.ietf.org/rfc/rfc1918.txt

307. Rescorla, E. und A. Schiffman: The Secure HyperText Transfer Protocol . RFC 2660 (Experimental), IETF, August 1999. URL: http://www.ietf.org/rfc/rfc2660.txt

308. Resnick, P.: Internet Message Format. RFC 2822 (Proposed Standard), IETF, April 2001. URL: http://www.ietf.org/rfc/rfc2822.txt

309. Rigney, C., A. Rubens, W. Simpson und S.Willens: Remote Authentication Dial In User Service (RADIUS). RFC 2138 (Proposed Standard), IETF, April 1997. Obsolet durch RFC 2865. URL: http://www.ietf.org/rfc/rfc2138.txt

310. Rigney, C., W. Willats und P. Calhoun: RADIUS Extensions. RFC 2869 (Informational), IETF, Juni 2000. Aktualisiert durch RFC 3579. URL: http://www.ietf.org/rfc/rfc2869.txt

311. Rigney, C., S.Willens, A. Rubens und W. Simpson: Remote Authentication Dial In User Service (RADIUS). RFC 2865 (Draft Standard), IETF, Juni 2000. Aktualisiert durch RFCs 2868, 3575. URL: http://www.ietf.org/rfc/rfc2865.txt

312. Rivest, R.:MD4 Message Digest Algorithm. RFC 1186 (Informational), IETF, Oktober 1990. Obsolet durch RFC 1320. URL: http://www.ietf.org/rfc/rfc1186.txt

313. Rivest, R.: The MD5 Message-Digest Algorithm. RFC 1321 (Informational), IETF, April 1992. URL: http://www.ietf.org/rfc/rfc1321.txt

314. Rivest, R. und B. Kaliski: RSA Problem. In: Tilborg, H. van (Herausgeber): Encyclopedia of Cryptography and Security. Springer, Mai 2005. ISBN 0-387-23473-X (noch nicht erschienen). URL: http://www.win.tue.nl/~henkvt/Content.html

315. Rivest, R., A. Shamir und L. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 1978.

316. Rivest, R. L. und B. Lampson: SDSI -- A Simple Distributed Security Infrastructure. Presented at CRYPTO'96 Rumpsession, April 1996.

317. Romkey, J.: Nonstandard for transmission of IP datagrams over serial lines: SLIP. RFC 1055 (Standard), IETF, Juni 1988. URL: http://www.ietf.org/rfc/rfc1055.txt

318. Rose, M.: The Blocks Extensible Exchange Protocol Core. RFC 3080 (Proposed Standard), IETF, März 2001. URL: http://www.ietf.org/rfc/rfc3080.txt

319. Rose, M. und K. McCloghrie: Structure and identification of management information for TCP/IP-based internets. RFC 1155 (Standard), IETF, Mai 1990. URL: http://www.ietf.org/rfc/rfc1155.txt

320. Rosen, E., A. Viswanathan und R. Callon: Multiprotocol Label Switching Architecture. RFC 3031 (Proposed Standard), IETF, Januar 2001. URL: http://www.ietf.org/rfc/rfc3031.txt

321. Rosenberg, J., H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley und E. Schooler: SIP: Session Initiation Protocol . RFC 3261 (Proposed Standard), IETF, Juni 2002. Aktualisiert durch RFCs 3265, 3853. URL: http://www.ietf.org/rfc/rfc3261.txt

322. Rosenberg, J., J. Weinberger, C. Huitema und R. Mahy: STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs). RFC 3489 (Proposed Standard), IETF, März 2003. URL: http://www.ietf.org/rfc/rfc3489.txt

323. RSA Laboratories: Cryptographic Challenges -- DES Challenge III, Januar 1999. URL: http://www.rsasecurity.com/rsalabs/node.asp?id=2108

324. RSA Security: RSA-576 is factored! , Dezember 2003. URL: http://www.rsasecurity.com/rsalabs/node.asp?id=2096

325. Saint-Andre, P.: End-to-End Signing and Object Encryption for the Extensible Messaging and Presence Protocol (XMPP). RFC 3923 (Proposed Standard), IETF, Oktober 2004. URL: http://www.ietf.org/rfc/rfc3923.txt

326. Saint-Andre, P.: Extensible Messaging and Presence Protocol (XMPP): Core. RFC 3920 (Proposed Standard), IETF, Oktober 2004. URL: http://www.ietf.org/rfc/rfc3920.txt

327. Saint-Andre, P.: Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence. RFC 3921 (Proposed Standard), IETF, Oktober 2004. URL: http://www.ietf.org/rfc/rfc3921.txt

328. Savola, P. und C. Patel: Security Considerations for 6to4. RFC 3964 (Informational), IETF, Dezember 2004. URL: http://www.ietf.org/rfc/rfc3964.txt

329. Schlyter, J.: DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format . RFC 3845 (Proposed Standard), IETF, August 2004. Obsolet durch RFCs 4033, 4034, 4035. URL: http://www.ietf.org/rfc/rfc3845.txt

330. Schneier, B.: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). In: First Fast Software Encryption Workshop, 1994.

331. Schneier, B.: Applied Cryptography. John Wiley & Son, 1996.

332. Schneier, B.: Twofish: A 128-Bit Block Cipher. Selected Areas in Cryptography, 1998.

333. Schneier, B.: Snakeoil. Crypto-Gram Newsletter, Februar 1999. URL: http://www.schneier.com/crypto-gram-9902.html#snakeoil

334. Schneier, B.: Secrets & Lies, Digital Security in a Networked World. John Wiley & Sons, 2000.

335. Schneier, B.: Beyond Fear. Copernicus Books, September 2003.

336. Schneier, B.: SHA-1 Broken, Februar 2005. URL: http://www.schneier.com/blog/archives/2005/02/sha1 broken.html

337. Schneier, B. und N. Ferguson: Practical Cryptography. John Wiley & Sons, 1. Auflage, März 2003.

338. Schneier, B. und Mudge: Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP). Proceedings of the 5th ACM Conference on Communications and Computer Security, ACM Press, 1998.

339. Schoepf, K., M. Moser, M. J. Muench, M. Lauer und R. Abathia: Wellenreiter Entwickler-Homepage, Dezember 2004. URL: http://www.wellenreiter.net

340. Schoffstall, M., J. Davin, M. Fedor und J. Case: SNMP over Ethernet. RFC 1089, IETF, Februar 1989. URL: http://www.ietf.org/rfc/rfc1089.txt

341. Schulzrinne, H. und S. Casner: RTP Profile for Audio and Video Conferences with Minimal Control. RFC 3551 (Standard), IETF, Juli 2003. URL: http://www.ietf.org/rfc/rfc3551.txt

342. Schulzrinne, H., S. Casner, R. Frederick und V. Jacobson: RTP: A Transport Protocol for Real-Time Applications. RFC 3550 (Standard), IETF, Juli 2003. URL: http://www.ietf.org/rfc/rfc3550.txt

343. Seifried, K.: What's in a Name?, 2001. URL: http://www.seifried.org/security/articles/20020414-ssh-name.html

344. Shamir, A.: Factoring Large Numbers with the TWINKLE Device (Extended Abstract). In: 1st International Workshop on Cryptographic Hardware and Embedded Systems, Oktober 1999.

345. Shamir, A. und E. Tromer: Factoring Large Numbers with the TWIRL Device. In: Crypto 2003 , Februar 2003.

346. Shamir, A. und E. Tromer: On the cost of factoring RSA-1024. RSACryptoBytes vol. 6, 2003.

347. Shepler, S., B. Callaghan, D. Robinson, R. Thurlow, C. Beame, M. Eisler und D. Noveck: Network File System (NFS) version 4 Protocol. RFC 3530 (Proposed Standard), IETF, April 2003. URL: http://www.ietf.org/rfc/rfc3530.txt

348. Shipley, P.: Pete's Demo Wardriving Map, Dezember 2004. URL: http://www.dis.org/wl/maps/

349. Shor, P.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science, S. 124--134, Santa Fe, NM, USA, November 1994. IEEE Computer Society Press.

350. Shutko, A.: OSCAR (ICQ v7/v8/v9) protocol documentation, 2004. URL: http://iserverd1.khstu.ru/oscar/

351. Simpson, W.: The Point-to-Point Protocol (PPP). RFC 1661 (Standard), IETF, Juli 1994. Aktualisiert durch RFC 2153. URL: http://www.ietf.org/rfc/rfc1661.txt

352. Singh, S.: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor, August 2000.

353. Singh, S.: Geheime Botschaften. DTV, Dezember 2001.

354. Skype: Free Internet telephony that just works, Dezember 2004. URL: http://www.skype.com

355. Smit, H. und T. Li: Intermediate System to Intermediate System (IS-IS) Extensions for Traffic Engineering (TE). RFC 3784 (Informational), IETF, Juni 2004. URL: http://www.ietf.org/rfc/rfc3784.txt

356. Snax, S., J. Bruestle und B. Hegerle: AirSnort Homepage, Dezember 2004. URL: http://airsnort.shmoo.com

357. Sommerfeld, B., R. Housley und S. Bellovin: Secure Shell (secsh) Charter, 2004. URL: http://www.ietf.org/html.charters/secsh-charter.html

358. Srisuresh, P. und K. Egevang: Traditional IP Network Address Translator (Traditional NAT). RFC 3022 (Informational), IETF, Januar 2001. URL: http://www.ietf.org/rfc/rfc3022.txt

359. Stephen Northcutt: SHADOW Project , Dezember 2004. URL: http://www.nswc.navy.mil/ISSEC/CID/

360. Stewart, R., Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang und V. Paxson: Stream Control Transmission Protocol. RFC 2960 (Proposed Standard), IETF, Oktober 2000. Aktualisiert durch RFC 3309. URL: http://www.ietf.org/rfc/rfc2960.txt

361. T. Freeman, R. H. und A. Malpani: Simple Certificate Validation Protocol (SCVP). Internet-Draft draft-ietf-pkix-scvp-18.txt, 2005. Arbeitsdokument der IETF.

362. Talwar, V., K. Nahrstedt und S. K. Nath: RSVP-SQOS : A Secure RSVP Protocol. In: Proceedings of IEEE International Conference on Multimedia and Expo. IEEE, August 2001. ICME 2001, Tokyo, Japan. URL: http://cairo.cs.uiuc.edu/publications/paper-files/rsvp ieeemm.ps

363. TechNet, M.: Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution, 2004. URL: http://www.microsoft.com/technet/security/bulletin/ MS04-028.mspx.

364. The Free Dictionary: Enzyklopädie thefreedictionary.com, 2004. URL: http://encyclopedia.thefreedictionary.com/block%20cipher%20modes% 20of%20operation.

365. The Optical Internetworking Forum: Working Group Architecture, Contribution Number: OIF2000.125.7, Oktober 2001. URL: http://citeseer.ist.psu.edu/665901.html

366. The Third Generation Partnership Project 2 (3GPP2): Introduction to cdma2000 Standards for Spread Spectrum Systems, 1999. URL: http://www.3gpp2.org

367. Thomson, S. und T. Narten: IPv6 Stateless Address Autoconfiguration. RFC 2462 (Draft Standard), IETF, Dezember 1998. URL: http://www.ietf.org/rfc/rfc2462.txt

368. Titz, O.: Why TCP Over TCP Is A Bad Idea, April 2001. URL: http://sites.inka.de/sites/bigred/devel/tcp-tcp.html

369. Toomey, T.: BENIDS (Network Intrusion Detection System), Dezember 2004. URL: http://www.duke.edu/~ttoomey/benids/

370. Townsley, W., A. Valencia, A. Rubens, G. Pall, G. Zorn und B. Palter: Layer Two Tunneling Protocol "L2TP". RFC 2661 (Proposed Standard), IETF, August 1999. URL: http://www.ietf.org/rfc/rfc2661.txt

371. Ts'o, T. und J. Altman: Telnet Authentication Option. RFC 2941 (Proposed Standard), IETF, September 2000. URL: http://www.ietf.org/rfc/rfc2941.txt

372. US-CERT: Vulnerability Note VU#13877: Weak CRC allows packet injection into SSH sessions encrypted with block ciphers, 2001. URL: http://www.kb.cert.org/vuls/id/13877

373. Vanstone, S.: Why ECC Is The Wave Of The Future, 2004. URL: http://www.wirelessweek.com/article/CA403405?spacedesc=Departments&stt=001

374. Veizades, J., E. Guttman, C. Perkins und S. Kaplan: Service Location Protocol. RFC 2165 (Proposed Standard), IETF, Juni 1997. Aktualisiert durch RFCs 2608, 2609. URL: http://www.ietf.org/rfc/rfc2165.txt

375. Villamizar, C., C. Alaettinoglu, D. Meyer und S. Murphy: Routing Policy System Security. RFC 2725 (Proposed Standard), IETF, Dezember 1999. Aktualisiert durch RFC 4012. URL: http://www.ietf.org/rfc/rfc2725.txt

376. Vixie, P., O. Gudmundsson, D. Eastlake 3rd und B. Wellington: Secret Key Transaction Authentication for DNS (TSIG). RFC 2845 (Proposed Standard), IETF, Mai 2000. Aktualisiert durch RFC 3645. URL: http://www.ietf.org/rfc/rfc2845.txt

377. Vixie, P., S. Thomson, Y. Rekhter und J. Bound: Dynamic Updates in the Domain Name System (DNS UPDATE). RFC 2136 (Proposed Standard), IETF, April 1997. Aktualisiert durch RFCs 3007, 4033, 4034, 4035. URL: http://www.ietf.org/rfc/rfc2136.txt

378. Vollbrecht, J., P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege und D. Spence: AAA Authorization Application Examples. RFC 2905 (Informational), IETF, August 2000. URL: http://www.ietf.org/rfc/rfc2905.txt

379. Vollbrecht, J., P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege und D. Spence: AAA Authorization Framework. RFC 2904 (Informational), IETF, August 2000. URL: http://www.ietf.org/rfc/rfc2904.txt

380. Wahl, M., T. Howes und S. Kille: Lightweight Directory Access Protocol (v3). RFC 2251 (Proposed Standard), IETF, Dezember 1997. Aktualisiert durch RFCs 3377, 3771. URL: http://www.ietf.org/rfc/rfc2251.txt

381. Wang, X., D. Feng, X. Lai und H. Yu: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004/199, August 2004. URL: http://eprint.iacr.org/2004/199

382. Wang, X. und H. Yu: How to Break MD5 and Other Hash Functions. In: Proceedings of EUROCRYPT 2005, Mai 2005.

383. Warden, W.: SSL VPN In Detail , Dezember 2003. URL: http:// securitypronews.com/securitypronews-24-20031201SSLVPNinDetail.html.

384. Waters, B., A. Juels, J. A. Halderman und E. W. Felten: New client puzzle outsourcing techniques for DoS resistance. In: Proceedings of the 11th ACM conference on Computer and communications security, S. 246--256. ACM Press, 2004.

385. White, R.: Securing BGP through Secure Origin BGP (soBGP). URL: ftp://ftp-eng.cisco.com/sobgp/

386. Wijnen, B., R. Presuhn und K. McCloghrie: View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC 3415 (Standard), IETF, Dezember 2002. URL: http://www.ietf.org/rfc/rfc3415.txt

387. Wu, T.-L., S. F. Wu, Z. Fu, H. Huang und F.-M. Gong: Securing QoS: Threats to RSVP messages and their countermeasures. In: Proceedings of 7th International Workshop on Quality of Service IWQoS'99, Juni 1999. URL: http://arqos.csc.ncsu.edu/papers/1999 10 iwqos99.pdf

388. Yavatkar, R., D. Pendarakis und R. Guerin: A Framework for Policybased Admission Control. RFC 2753 (Informational), IETF, Januar 2000. URL: http://www.ietf.org/rfc/rfc2753.txt

389. Yeong, W., T. Howes und S. Kille: X.500 Lightweight Directory Access Protocol. RFC 1487 (Historic), IETF, Juli 1993. Obsolet durch RFCs 1777, 3494. URL: http://www.ietf.org/rfc/rfc1487.txt

390. Yonan, J.: OpenVPN - An Open Source VPN Solution, April 2005. URL: http://openvpn.net

391. Zeilenga, K. D.: The Anonymous SASL Mechanism. Internet-Draft -- draftietf- sasl-anon-05.txt, IETF, Februar 2005. Arbeitsdokument der IETF.

392. Zeilenga, K. D.: The Plain SASL Mechanism. Internet-Draft -- draft-ietfsasl- plain-08.txt, IETF, März 2005. Arbeitsdokument der IETF.

393. Ziemba, G., D. Reed und P. Traina: Security Considerations for IP Fragment Filtering. RFC 1858 (Informational), IETF, Oktober 1995. Aktualisiert durch RFC 3128. URL: http://www.ietf.org/rfc/rfc1858.txt

394. Zimmermann, P. R.: PGP Source Code and Internals. MIT Press, 2005.

395. Zorn, G.: Microsoft PPP CHAP Extensions, Version 2. RFC 2759 (Informational), IETF, Januar 2000. URL: http://www.ietf.org/rfc/rfc2759.txt

396. Zorn, G. und S. Cobb: Microsoft PPP CHAP Extensions. RFC 2433 (Informational), IETF, Oktober 1998. URL: http://www.ietf.org/rfc/rfc2433.txt

397. Zsako, J.: PGP Authentication for RIPE Database Updates. RFC 2726 (Proposed Standard), IETF, Dezember 1999. URL: http://www.ietf.org/rfc/rfc2726.txt

Zuletzt geändert: $Date: 2005/10/18 22:00:55 $