% % This file was created by the TYPO3 extension % bib % --- Timezone: UTC % Creation date: 2024-10-05 % Creation time: 10-37-50 % --- Number of references % 4 % @Techreport { 2015-draft-moskowitz-hip-dex-04, title = {HIP Diet EXchange (DEX)}, year = {2015}, month = {7}, day = {20}, number = {draft-moskowitz-hip-dex-04}, abstract = {This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2. The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-moskowitz-hip-dex-04}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Moskowitz, Robert and Hummen, Ren{\'e}} } @Techreport { 2015-draft-moskowitz-hip-dex-03, title = {HIP Diet EXchange (DEX)}, year = {2015}, month = {6}, day = {19}, number = {draft-moskowitz-hip-dex-03}, abstract = {This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2. The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-moskowitz-hip-dex-03}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Moskowitz, Robert and Hummen, Ren{\'e}} } @Inproceedings { 2015-ziegeldorf-iwpe-comparison, title = {Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks}, year = {2015}, month = {5}, day = {21}, pages = {198-205}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-iwpe-choose.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA}, language = {en}, DOI = {10.1109/SPW.2015.9}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Metzke, Jan and Henze, Martin and Wehrle, Klaus} } @Proceedings { 2015-sdnflex-heuschkel-dyns, title = {Protocol Virtualization through Dynamic Network Stacks}, year = {2015}, month = {3}, day = {9}, publisher = {IEEE}, event_place = {Cottbus}, event_name = {SDNFlex Workshop (NetSys 2015)}, event_date = {March 2015, 9-12}, language = {en}, DOI = {10.1109/NetSys.2015.7089055}, reviewed = {1}, author = {Heuschkel, Jens and Schweizer, Immanuel and Zimmermann, Torsten and Wehrle, Klaus and M{\"u}hlh{\"a}user, Max} }