Braden et al., 1994 - Google Patents
Report of IAB workshop on security in the internet architecture-February 8-10, 1994Braden et al., 1994
View HTML- Document ID
- 14278337123942991850
- Author
- Braden R
- Clark D
- Crocker S
- Huitema C
- Publication year
External Links
Snippet
RFC 1636: Report of IAB Workshop on Security in the Internet Architecture - February 8-10,
1994 [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network
Working Group R. Braden Request for Comments: 1636 ISI Category: Informational D. Clark …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Oppliger | Internet and intranet security | |
Rescorla et al. | Guidelines for writing RFC text on security considerations | |
Gritzalis | Enhancing web privacy and anonymity in the digital era | |
KR101076848B1 (en) | Reducing network configuration complexity with transparent virtual private networks | |
US20030217148A1 (en) | Method and apparatus for LAN authentication on switch | |
Barnes et al. | Browser-to-browser security assurances for WebRTC | |
US20140122876A1 (en) | System and method for providing a secure book device using cryptographically secure communications across secure networks | |
US20130219172A1 (en) | System and method for providing a secure book device using cryptographically secure communications across secure networks | |
Estrin et al. | VISA scheme for inter-organization network security | |
Song et al. | Review of network-based approaches for privacy | |
Joshi | Network security: know it all | |
Martin Jr | Local anonymity in the Internet | |
Chauhan et al. | Computer Security and Encryption: An Introduction | |
Braden et al. | Report of IAB workshop on security in the internet architecture-February 8-10, 1994 | |
Braden et al. | Rfc1636: Report of iab workshop on security in the internet architecture-february 8-10, 1994 | |
Mäki | Security Fundamentals in Ad Hoc Networking | |
Zhang et al. | A private matchmaking protocol | |
Rescorla et al. | RFC3552: Guidelines for Writing RFC Text on Security Considerations | |
Aura et al. | Communications security on the Internet | |
Buchberger | Adopting the Noise key exchange in Tox | |
Cui et al. | Approaching secure communications in a message-oriented mobile computing environment | |
Parham et al. | Validation of security for participant control exchanges in multicast content distribution | |
Brown | End-to-end security in active networks | |
Liu | A security architecture for a peer-to-peer video conference system | |
Akhter et al. | Comparative Analysis of Authentication and Authorization Security in Distributed System |