Bellovin, 2009 - Google Patents
Guidelines for specifying the use of ipsec version 2Bellovin, 2009
View HTML- Document ID
- 14515888647019395479
- Author
- Bellovin S
- Publication year
External Links
Snippet
RFC 5406: Guidelines for Specifying the Use of IPsec Version 2 [RFC Home] [TEXT|PDF|HTML]
[Tracker] [IPR] [Info page] BEST CURRENT PRACTICE Network Working Group S. Bellovin
Request for Comments: 5406 Columbia University BCP: 146 February 2009 Category: Best …
- 230000000694 effects 0 abstract description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7562386B2 (en) | Multipoint server for providing secure, scaleable connections between a plurality of network devices | |
US7188365B2 (en) | Method and system for securely scanning network traffic | |
US9838362B2 (en) | Method and system for sending a message through a secure connection | |
Maughan et al. | Internet security association and key management protocol (ISAKMP) | |
US7231664B2 (en) | System and method for transmitting and receiving secure data in a virtual private group | |
US8607301B2 (en) | Deploying group VPNS and security groups over an end-to-end enterprise network | |
Winter et al. | Transport layer security (TLS) encryption for RADIUS | |
US20040268121A1 (en) | Reducing network configuration complexity with transparent virtual private networks | |
US20030191843A1 (en) | Secure network connection for devices on a private network | |
Maughan et al. | Rfc2408: Internet security association and key management protocol (isakmp) | |
US20080104693A1 (en) | Transporting keys between security protocols | |
Bellovin | Guidelines for specifying the use of ipsec version 2 | |
US20150381387A1 (en) | System and Method for Facilitating Communication between Multiple Networks | |
Kara | Secure remote access from office to home | |
Khandkar et al. | Masking host identity on internet: Encrypted TLS/SSL handshake | |
Cisco | Introduction to Cisco IPsec Technology | |
Kasera et al. | On securely enabling intermediary-based services and performance enhancements for wireless mobile users | |
Hills et al. | IP virtual private networks | |
Al-faluji | Internet Protocol Security for Secure Communication: Fundamentals, Services and Application | |
JP2006216014A (en) | System and method for authenticating a message, firewall for authenticating a message, network device, and computer-readable medium | |
Gabriel-Robez | VPN and Firewall Traversal | |
Casole et al. | Secure access to corporate resources in a multi-access perspective: needs, problems, and solutions | |
Winter et al. | RFC 6614: Transport Layer Security (TLS) Encryption for RADIUS | |
Kirstein et al. | Dynamic Virtual Private Networks | |
Zhou et al. | Research of secure anycast |