Brown et al. "Secure File Transfer Over TCO/IP", IEEE Region 10 Conf. pp. 494-498, Nov. 1992. |
Ramaswamy, "A Security Archictecture and Mechanism for Data Confidentiuality in TCP/IP Protocols", SEcurity and Privacy, IEEE Symposium, pp. 249-259, 1990. |
Stallings "IPV6: The New Internet Protocol", IEEE Communications Magazine, pp. 96-108, Jul. 1996. |
Guha et al., "Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions" Infocom, IEEE, pp. 603-610, 1996. |
RCF793, Transmission Control Protocol, DARPA Internet Program Protocol Specification, Sep., 1981, pp. 1-85. |
"IP-Spoofing Demystified, Trust-Relationship Exploitation," Phrack Magazine, vol. 7, Issue Forty-eight, Jun., 1996, pp. 1-9. |
Statements from Public Access Networks Corporation (PANIX), Sep., 1996, one page. |
Syncookies Mailing List Archives, pp. 1-15. |
Bellovin, S.M., Security Problems in the TCP/IP Protocol Suite, Computer Communications Review, vol. 19, No. 2, Apr. 1, 1989, pp. 32-48. |
Reid, J., Open Systems Security, Traps and Pitfalls, Computers & Security International Journal Devoted to the Study of Technical and Financial Aspects of Computer Security, vol. 14, No. 6, Jan. 1, 1995. |
Guha, B., et al., Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions, Proceedings of IEEE Infocom 1996, Conference on Computer Communications, Mar. 24-28, 1996, vol. 2, No. conf. 15, Mar. 24, 1996, Institute of Electrical and Electronics Engineers, pp. 603-610. |
Hastings, N.E., et al., TCP/IP Spoofing Fundamentals, Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications, Scottsdale, Mar. 27, 1996 No. conf. 15, Mar. 27-29, 1996, Institute of Electrical and Electronics Engineers, pp. 218-224. |