refer11

11.  

11.0.

[A] .. . ., / 33965,1999.

[B] ATM Forum: http://www.atmforum.com/atmforum/index.html

[C] "ATM Security Specification, Version 1.0" http://www.atmforum.com/atmforum/specs/approved.html

[D] "ATM Forum: Glossary": http://www.atmforum.com/atmforum/library/glossary/gloss-print.html

  


 

11.1.

[1] ATM Forum Technical Committee, B-ICI Specification, Version 2.0.

[2] ATM Forum Technical Committee, User-Network Interface (UNI) Specification, Version 3.1, September 1994.

[3] ATM Forum Technical Committee, User-Network Interface (UNI) Signalling Specification, Version 4.0, April 1996.

[4] ATM Forum, UNI Signaling 4.0 Security Addendum,, ATM Forum BTD-CS-UNI-SEC-01.03, October 1998.

[5] ATM Forum, PNNI Signaling 1.0 Security Addendum, ATM Forum BTD-CS-PNNI-SEC-01.03, October 1998

[6] Federal Information Processing Standards Publication 46-2 (FIPS PUB 46-2), Data Encryption Standard (DES), December 1993.

[7] Federal Information Processing Standards Publication 81 (FIPS PUB 81), DES Modes of

Operation, December 1980.

[8] Federal Information Processing Standards Publication 180-1 (FIPS PUB 108-1), Secure Hash

Standard, April 1995.

[9] Federal Information Processing Standards Publication 186 (FIPS PUB 186), Digital Signature Standard, May 1994.

[10] Federal Information Processing Standards Publication 188 (FIPS PUB 188), Standard Security

Label for Information Transfer, September 1994.

[11] IETF, HMAC: Keyed-Hashing for Message Authentication, RFC 2104, February 1997.

[12] IETF, The MD5 Message Digest Algorithm, RFC 1321, April 1992.

[13] IETF, Privacy Enhancement for Internet Electronic Mail (PEM), RFCs 1421-1424, February 1993.

[14] IETF, U.S. Department of Defense Security Options for the Internet Protocol, RFC 1108, November 1991.

[15] ISO/IEC 9594-8, 1995 (E), Information Technology -- Open Systems Interconnection -- The

Directory: Authentication Framework.

[16] ISO/IEC 9594-8, 1995, Amendment 1: Certificate Extensions.

[17] ISO/IEC 9797, Information Technology - Security Techniques - Data Integrity Mechanism using

a Cryptographic Check Function Employing a Block Cipher Algorithm, 1994.

[18] ISO/IEC 10118-3, Hash Functions - Part 3: Dedicated Hash Functions, 1997.

[19] ITU-T Recommendation I.363, B-ISDN ATM Adaptation Layer (AAL) Specification, March 1993.

[20] ITU-T Recommendation I.610, B-ISDN Operation and Maintenance Principles and Functions, November 1994.

[21] ITU-T Recommendation Q.2931, B-ISDN DSS2 User-Network Interface Layer 3 Specification

for Basic Call/Connection Control, February 1995.

[22] ITU-T Recommendation Q.2971, B-ISDN DSS2 User-Network Interface Layer 3 Specification

for Point-to-Multipoint Call/Connection Control, 1995.

[23] ITU-T Recommendation X.509, The Directory: Authentication Framework, 1993.

[24] Public Key Cryptography Standards #1 (PKCS #1), RSA Encryption Standard, RSA

Laboratories, Version 1.5, November 1993.

[25] ANSI X9.17, Financial Institution Key Management (Wholesale), April 1985, p.23.

 

11.2.

[26] Agnew, Mullin, and Vanstone, Improved Digital Signature Scheme Based on Discrete

Exponentiation, Electronic Letters, Vol. 26, pp. 1024-1025, 1990.

[27] Bird, et al., The KryptoKnight Family of Light-Weight Protocols for Authentication and Key

Distribution, IEEE/ACM Transactions on Networking, Vol. 3, no. 1, pp. 31-41, February 1995.

[28] ETSI TCR-TR 028, Network Aspects (NA); Security Techniques Advisory Group (STAG);

Glossary of security terminology, 1995.

[29] Fujioka, A., et al., ESIGN: An Efficient Digital Signature Implementation for Smart Cards,

Proceedings of Eurocrypt 91, Springer-Verlag, pp. 446-457, 1991.

[30] IEEE P1363, Standard Specifications For Public Key Cryptography, Draft, Version 1, December 1997.

[31] IETF, Internet Security Association and Key Management Protocol (ISAKMP), RFC 2408, November 1998.

[32] Miyaguchi, S., et al., Expansion of FEAL Cipher, NTT Review, Vol. 2, no. 6, pp. 117-127, November 1990.

[33] Miyaguchi, S., The FEAL Cipher Family, Advances in Cryptology - CRYPTO 90, LNCS 537,

pp. 627-638, Springer-Verlag, 1991.

[34] Okamoto, T., A Fast Signature Scheme Based on Congruential Polynomial Operations, IEEE

Transactions on Information Theory, Vol. 36, no. 1, pp. 47-53, 1990.

[35] Schneier, B., Applied Cryptography, 2nd edition, John Wiley & Sons, 1996.