Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
Security Multiparts for MIME: Multipart/Signed and Multipart/Encrypted
This document defines a framework within which security services may be applied to MIME body parts: the type and contents of the control information body parts are determined by the value of the protocol parameter of the enclosing multipart/signed or multiparts/encrypted content type, which is required to be present.
Randomness Recommendations for Security
The use of pseudo-random processes to generate secret quantities can result in pseudo-security because the sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities than to locate the quantities in the whole of the number space.
Randomness Requirements for Security
This document recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose and provides suggestions to ameliorate the problem when a hardware solution is not available.
MIME Object Security Services
This document defines MIME Object Security Services (MOSS), a protocol that uses the multipart/signed and multipart/encrypted framework  to apply digital signature and encryption services to MIME…
Report of IAB Workshop on Security in the Internet Architecture - February 8-10, 1994
This document is a report on an Internet architecture workshop, initiated by the IAB and held at USC Information Sciences Institute on February 8-10, 1994, focused on security issues in the Internet architecture.
Not All RFCs are Standards
This document discusses the relationship of the Request for Comments (RFCs) notes to Internet Standards.
30 Years of RFCs
CyberCash Credit Card Protocol Version 0.8
This version of CyberCash includes credit card payments only and the structure and communications protocols of version 0.8 are described.
Host/Host Protocol for the ARPA Network
The Host/Host Protocol describes a protocol used to manage communication between processes residing on independent Hosts that addresses issues of multiplexing multiple streams of communication over a single hardware interface.
The Process for Organization of Internet Standards Working Group (POISED)
- S. Crocker
This report, originally prepared in January 1993 provides a summary of the POISED WG, starting from the events leading to the formation of the WG to the end of 1992, to convey as neutral a point of view as possible.