[go: up one dir, main page]

Tschofenig et al., 2005 - Google Patents

RSVP security properties

Tschofenig et al., 2005

View HTML
Document ID
15379136692528767588
Author
Tschofenig H
Graveman R
Publication year

External Links

Snippet

RFC 4230: RSVP Security Properties [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] INFORMATIONAL Errata Exist Network Working Group H. Tschofenig Request for Comments: 4230 Siemens Category: Informational R. Graveman RFG Security December …
Continue reading at www.rfc-editor.org (HTML) (other versions)

Similar Documents

Publication Publication Date Title
Seth et al. Practical security for disconnected nodes
US20060059344A1 (en) Service authentication
Tschofenig et al. Security Threats for Next Steps in Signaling (NSIS)
US20100031042A1 (en) Method and System for Secure Session Establishment Using Identity-Based Encryption (VDTLS)
Cam-Winget et al. The flexible authentication via secure tunneling extensible authentication protocol method (EAP-FAST)
Chen et al. Secure communication channel establishment: TLS 1.3 (over TCP fast open) vs. QUIC
Shah et al. A TOTP‐Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead
Chen et al. Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC
Tschofenig et al. RSVP security properties
CN116321158B (en) Certificate-based local UE authentication
Sigholt et al. Keeping connected when the mobile social network goes offline
Ghosh et al. Securing ad-hoc networks using IPsec
Manulis et al. Authenticated wireless roaming via tunnels: Making mobile guests feel at home
Cisco Introduction to Cisco IPsec Technology
Moravčík et al. Survey of real-time multimedia security mechanisms
Hosia Comparison between RADIUS and Diameter
Hong et al. PBS: Signaling architecture for network traffic authorization
Fu et al. ISCP: Design and implementation of an inter-domain Security Management Agent (SMA) coordination protocol
Detal et al. An adaptive three-party accounting protocol
Calvert et al. Secure, customizable, many-to-one communication
Felis et al. Securing a Path-Coupled NAT/Firewall Signaling Protocol
Marin-Lopez et al. RFC 9820 Authentication Service Based on the Extensible Authentication Protocol (EAP) for Use with the Constrained Application Protocol (CoAP)
Tschofenig et al. Securing the Next Steps In Signalling (NSIS) protocol suite
CN120675819A (en) QUIC protocol-based distributed node unified identity authentication method and system
Palmieri et al. Securing the MPLS control plane