References
- Hyotaek Lim, Saebom Choi.: Design and Implementation of iSCSI-based Virtual Storage System for Mobile Health Care, HEALTHCOM 2005, Jun. 2005, PP 37-42
- J. Satran, K. Meth, C. Sapuntzakis, M. Chadalapaka, E. Zeidner.: Internet Small Computer Systems Interface (iSCSI), Request For Comments 3720, April 2004
- T. Wu: The Secure Remote Password Protocol, Proceedings of the Internet Society Symposium on Network and Distributed System Security, NDSS 98, San Diego, California. March 1998, PP. 97-111
- M. Bellare and C. Namprempre.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Lecture Notes In Computer Science, Vol. 1976, pp. 531- 545
- B. Aboba, J. Tseng, J. Walker, V. Rangan, and F. Travostino.: Securing Block Storage Protocols over IP, Request For Comments 3723, April 2004
- S. Kent and R. Atkinson.: Security Architecture for the Internet Protocol, Request For Comments 2401, November 1998
- Shuang-Yi Tang, Ying-Ping Lu, David H.C Du.: Performance Study of Software-Based iSCSI Security, Proceedings of the First InternationalIEEE Security in Storage Workshop, December 11, 2002
- S. Kent and R. Atkinson: IP Authentication Header, Request For Comments 2402, November 1998
- S. Kent and R. Atkinson and.: IP Encapsulating Security Payload (ESP), Request For Comments 2406, November 1998
- D. Harkins and D. Carrel.: The Internet Key Exchange (IKE), Request For Comments 2409, November 1998
- Jail Arkko and Pekka Nikander.: Limitations of IPsec Policy Mechanisms, In Security Protocols, Eleventh International Workshop, Cambridge, UK, April 2003
- IEEE Standard 1363.2 Study Group. Password-Based Public-Key Cryptography, http://grouper.ieee.org/groups/ 1363/passwdPK
- K. Lauter, "The advantages of Elliptic Curve Cryptography For Wireless Security", IEEE Wireless Communications, vol. 11, no. 1, Feb 2004, PP. 62-67
- K. Chen, M. Henricksen, W. Millan, J. Fuller, L. Simpson, E. Dawson, H. Lee, and S. Moon.: Dragon: A fast word based stream cipher, ECRYPT Stream Cipher Project Report 2005/2006
- H. Krawczyk, M. Bellare and R. Canetti.: HMAC: Keyed-Hashing for Message Authentication, Internet Engineering Task Force, Request For Comments 2104, 1997
- National Institute of Standards and Technology, FIPS-180-2: Secure Hash Standard (SHS), August 2002
- UNH-iSCSI project, http://unh-iscsi.sourceforge.net/
- Threaded I/O Tester, http://sourceforge.net/projects/ tiobench/