Menezes et al, Handbook of Applied Cryptography, CRC Press, Oct. 17, 1996, pp. 387, 400-402.* |
J. Case, M. Fedor, M. Schoffstall, and J. Davin, “A Simple Network Management Protocol (SNMP),” RFC 1157, by May 1990, 36 pages. |
Network Working Group, G. Walters, Editor, “User-based Security Model for SNMPv2,” RFC 1910, Feb. 1996, 40 pages. |
Ulyless Black, TCP/IP and Related Protocols, McGraw-Hill, Inc., New York, N.Y., pp. 304-310. |
Computer Security, Time-Life Books, Inc., Richmond, Va., 1990, pp. 87-117. |
Roger M. Needham, “The Changing Environment for Security Protocols,” IEEE Network, IEEE, New York, N.Y., vol. 11, No. 3, May/Jun. 1997, pp. 12-15. |
Chadwick et al., “Merging and Extending the PGP and PEM Trust Models—The ICE-TEL Trust Model,” IEEE Network, IEEE, New York, N.Y., vol. 11, No. 3, May/Jun. 1997, pp. 16-24. |
Blumenthal et al., “Key Derivation for Network Management Applications,” IEEE Network, IEEE, New York, N.Y., vol. 11, No. 3, May/Jun. 1997, pp. 26-29. |
Michael Herfert, “Security Enhanced Mailing Lists,” IEEE Network, IEEE, New York, N.Y., vol. 11, No. 3, May/Jun. 1997, pp. 30-33. |
Peyravian et al., “Asynchronous Transfer Mode Security,” IEEE Network, IEEE, New York, N.Y., vol. 11, No. 3, May/Jun. 1997, pp. 34-40. |
Bruce Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996, pp. 5, 51, 56, 68, 210. |
Paul J. Leach & Dilip C. Naik, “A Common Internet File System (CIFS/1.0) Protocol,” Network Working Group, Microsoft Corp., Dec. 19, 1997, pp. 1-121. |
Fibre Channel—FAQ's Answers, Fibre Channel Association, Mountain View, CA, Mar. 18, 1998, 15 pages. |
Fibre Channel Tutorial, Fibre Channel Association, Mountain View, CA, Mar. 7, 1998, 8 pages. |
Zoltan Meggyesi, Fibre Channel Overview, Research Institute For Patrticles and Nuclear Physics, Budapest, Hungary, Dec. 9, 1997, 10 pages. |