[go: nahoru, domu]

Braden et al., 1994 - Google Patents

Report of IAB workshop on security in the internet architecture-February 8-10, 1994

Braden et al., 1994

View HTML
Document ID
14278337123942991850
Author
Braden R
Clark D
Crocker S
Huitema C
Publication year

External Links

Snippet

RFC 1636: Report of IAB Workshop on Security in the Internet Architecture - February 8-10, 1994 [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group R. Braden Request for Comments: 1636 ISI Category: Informational D. Clark …
Continue reading at www.rfc-editor.org (HTML) (other versions)

Similar Documents

Publication Publication Date Title
Oppliger Internet and intranet security
Rescorla et al. Guidelines for writing RFC text on security considerations
Gritzalis Enhancing web privacy and anonymity in the digital era
KR101076848B1 (en) Reducing network configuration complexity with transparent virtual private networks
US20030217148A1 (en) Method and apparatus for LAN authentication on switch
Barnes et al. Browser-to-browser security assurances for WebRTC
US20140122876A1 (en) System and method for providing a secure book device using cryptographically secure communications across secure networks
US20130219172A1 (en) System and method for providing a secure book device using cryptographically secure communications across secure networks
Estrin et al. VISA scheme for inter-organization network security
Song et al. Review of network-based approaches for privacy
Joshi Network security: know it all
Martin Jr Local anonymity in the Internet
Chauhan et al. Computer Security and Encryption: An Introduction
Braden et al. Report of IAB workshop on security in the internet architecture-February 8-10, 1994
Braden et al. Rfc1636: Report of iab workshop on security in the internet architecture-february 8-10, 1994
Mäki Security Fundamentals in Ad Hoc Networking
Zhang et al. A private matchmaking protocol
Rescorla et al. RFC3552: Guidelines for Writing RFC Text on Security Considerations
Aura et al. Communications security on the Internet
Buchberger Adopting the Noise key exchange in Tox
Cui et al. Approaching secure communications in a message-oriented mobile computing environment
Parham et al. Validation of security for participant control exchanges in multicast content distribution
Brown End-to-end security in active networks
Liu A security architecture for a peer-to-peer video conference system
Akhter et al. Comparative Analysis of Authentication and Authorization Security in Distributed System