The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for IPSec with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2000 (28) 2001 (21) 2002 (28) 2003 (46) 2004 (50) 2005 (84) 2006 (53) 2007 (47) 2008 (39) 2009 (34) 2010 (26) 2011 (17) 2012-2013 (22) 2014-2015 (20) 2016-2017 (16) 2018-2019 (24) 2020-2021 (16) 2022-2023 (16)
Publication types (Num. hits)
article(154) incollection(8) inproceedings(424) phdthesis(1)
Venues (Conferences, Journals, ...)
RFC(54) LCN(10) SAINT Workshops(9) Security Protocols Workshop(9) ESORICS(8) ISCC(8) AINA(7) SECRYPT(7) CCS(6) NDSS(6) ARES(5) CoRR(5) IACR Cryptol. ePrint Arch.(5) ICC(5) IEEE Access(5) NETWORKING(5) More (+10 of total 334)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 447 occurrences of 240 keywords

Results
Found 587 publication records. Showing 587 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Diana K. Smetters, Glenn Durfee Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2003 DBLP  BibTeX  RDF
18Matteo Berioli, Francesco Trotta IP mobility support for IPsec-based virtual private networks: an architectural solution. Search on Bibsonomy GLOBECOM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Fan Zhao, Shyhtsun Felix Wu Analysis and improvement on IPSec anti-replay window protocol. Search on Bibsonomy ICCCN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Mark C. Benvenuto, Angelos D. Keromytis EasyVPN: IPsec Remote Access Made Easy. Search on Bibsonomy LISA The full citation details ... 2003 DBLP  BibTeX  RDF
18Hugh Daniel IPsec. Search on Bibsonomy LISA The full citation details ... 2003 DBLP  BibTeX  RDF
18Katsuji Tsukamoto, Masaaki Matsushima, Kazuhiko Matsuki, Yusuke Takano An Experimental Study on IPSec. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2002 DBLP  BibTeX  RDF
18Jochen Seitz 0001 Demystifying the IPsec Puzzle: Sheila Frankel, 273 pages, Boston, London: Artech House 2001, ISBN 1-58053-079-6. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Ronggong Song, Larry Korba Anonymous Internet Communication Based on IPSec. Search on Bibsonomy Communication Systems: The State of the Art (IFIP World Computer Congress) The full citation details ... 2002 DBLP  BibTeX  RDF
18Omar S. Elkeelany, Mustafa M. Matalgah, Khurram Sheikh, M. Thaker, Ghulam M. Chaudhry, Deepankar Medhi, Jihad Qaddour Performance analysis of IPSec protocol: encryption and authentication. Search on Bibsonomy ICC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Van Le, Hervé Guyennet IPSec and DNSSEC to Support GRID Application Security. Search on Bibsonomy CCGRID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, Jawed I. A. Siddiqi Performance of Multimedia Applications with IPSec Tunneling. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF VPN technology, Tunneling techniques, Network Security
18Neil Dunbar IPsec Networking Standards - An Overview. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Baiju V. Patel, Bernard Aboba, William Dixon 0001, Glen Zorn, Skip Booth Securing L2TP using IPsec. Search on Bibsonomy RFC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Gabriel E. Montenegro, Michael S. Borella RSIP Support for End-to-end IPsec. Search on Bibsonomy RFC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Matt Blaze, John Ioannidis, Angelos D. Keromytis Trust Management for IPsec. Search on Bibsonomy NDSS The full citation details ... 2001 DBLP  BibTeX  RDF
18Zhi Fu, Shyhtsun Felix Wu Automatic Generation of IPSec/VPN Security Policies In an Intra-Domain Environment. Search on Bibsonomy DSOM The full citation details ... 2001 DBLP  BibTeX  RDF
18Su-Hyung Jo, Jaehoon Nah, Sung Won Sohn Web-based Security Management System for IPsec. Search on Bibsonomy IMSA The full citation details ... 2001 DBLP  BibTeX  RDF
18Chien-Lung Wu, Shyhtsun Felix Wu, Ravindar Narayan IPSec/PHIL (packet header information list): design, implementation, and evaluation. Search on Bibsonomy ICCCN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Madalina Baltatu, Antonio Lioy, Dario Lombardo, Daniele Mazzocchi Towards a policy system for IPsec: issues and an experimental implementation. Search on Bibsonomy ICON The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Reiner Sailer, Arup Acharya, Mandis Beigi, Raymond B. Jennings III, Dinesh C. Verma IPSECvalidate: A Tool to Validate IPSEC Configurations. Search on Bibsonomy LISA The full citation details ... 2001 DBLP  BibTeX  RDF
18Aurélien Bonnet, Marc Lobelle Extending a Campus Network with Remote Bubbles Using IPsec. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Tom Markham, Chuck Williams Key Recovery Header for IPSEC. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Mohammed Achemlal, Maryline Laurent Analyse des fonctions des protocoles ipsec et leur intégration dans un réseau privé virtuel. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18John Ioannidis, Angelos D. Keromytis Network security and IPsec (tutorial). Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Yongguang Zhang, Bikramjit Singh A Multi-Layer IPSEC Protocol. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2000 DBLP  BibTeX  RDF
18Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha An IPSec-based Host Architecture for Secure Internet Multicast. Search on Bibsonomy NDSS The full citation details ... 2000 DBLP  BibTeX  RDF
18Jun-ichiro itojun Hagino Mbuf Issues in 4.4BSD IPv6 Support-Experiences from KAME IPv6/IPsec Implementation. Search on Bibsonomy USENIX Annual Technical Conference, FREENIX Track The full citation details ... 2000 DBLP  BibTeX  RDF
18Pyda Srisuresh Security Model with Tunnel-mode IPsec for NAT Domains. Search on Bibsonomy RFC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Rodney Thayer Benefits of IPsec. Search on Bibsonomy NDSS The full citation details ... 1999 DBLP  BibTeX  RDF
18Bob Braden Arguments Against IPSEC. Search on Bibsonomy NDSS The full citation details ... 1999 DBLP  BibTeX  RDF
18Rob Glenn, Stephen T. Kent The NULL Encryption Algorithm and Its Use With IPsec. Search on Bibsonomy RFC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Naganand Doraswamy VPN and IPsec. Search on Bibsonomy NDSS The full citation details ... 1998 DBLP  BibTeX  RDF
18Cheryl Madson An Intermediate System's View of IPSEC. Search on Bibsonomy NDSS The full citation details ... 1998 DBLP  BibTeX  RDF
18Louis Berger, Tim O'Malley RSVP Extensions for IPSEC Data Flows. Search on Bibsonomy RFC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Pedro Javier Fernández Ruiz, Cristian A. Nieto Guerra, Antonio Fernandez Gómez-Skarmeta Deployment of a Secure Wireless Infrastructure Oriented to Vehicular Networks. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Open-Source Implementation, Mobility, Authentication, WiMAX, Vehicular Networks, IPsec, EAP, IKEv2
18Seong Oun Hwang How Viable Is Digital Rights Management?. Search on Bibsonomy Computer The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, Internet Protocol, IPv6, IPSec, IPv4, network attacks
18Haitham S. Cruickshank, Robert J. Mort, Matteo Berioli Broadband Satellite Multimedia (BSM) Security Architecture and Interworking with Performance Enhancing Proxies. Search on Bibsonomy PSATS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SI-SAP, TCP, IPsec, TLS, PEP, BSM
18Wafaa Bou Diab, Samir Tohmé Seamless Handover and Security Solution for Real-Time Services. Search on Bibsonomy ISM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF E2E security, Fast Authentication, IPHC, CRTP, VoIP, IMS, IPSec, Seamless Handover, FMIPv6
18A. Al-Haj, John Mellor, Irfan-Ullah Awan Performance Evaluation of Secure Call Admission Control for Multiclass Internet Services. Search on Bibsonomy AINA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SCAC, QoS, network security, IPSec, MIS
18Siva Rama Krishnan Somayaji, Ch. A. S. Murty Securing Internet Protocol (IP) Storage: A Case Study. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireshak, SSLv2, Initiator, IPsec, Target, iSCSI
18Khaled Masmoudi, Hossam Afifi Building identity-based security associations for provider-provisioned virtual private networks. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IPsec security associations, Internet key exchange protocol, Provider-provisioned VPNs, Applied identity-based cryptography
18Shirantha Wijesekera, Sajal Palit, Bala Balachandran Software Development for B92 Quantum Key Distribution Communication Protocol. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Quantum Key Distribution (QKD), B92, BB84, QBER, Socket Programming, TCP/IP, IPsec
18Wafaa Bou Diab, Samir Tohmé, Carole Bassil Critical vpn security analysis and new approach for securing voip communications over vpn networks. Search on Bibsonomy WMuNeP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF voice over VPN, security, SIP, VoIP, IPSec, VPN
18Vesselin Tzvetkov, Holger Zuleger Service Provider Implementation of SIP Regarding Security. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFC 3261, MIKEY, SBC, Security, SIP, VoIP, IPSec, SSL, TLS, SIPS, SRTP
18R. Radhakrishnan, Majid Jamil, Shabana Mehfuz, Moinuddin Moinuddin Security issues in IPv6. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TCP/IP, IPv6, PKI, IPSec, NAT, IKE, CGA
18Carl M. Ellison, Steve Dohrmann Public-key support for group collaboration. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF S/MIME, SDSI, PKI, Human-computer interface, IPsec, PGP, SSH, SPKI
18Anand Raghunathan, Nachiketh R. Potlapally, Srivaths Ravi 0001 Securing Wireless Data: System Architecture Challenges. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
18Hiroto Yasuura, Hiroyuki Tomiyama, Takanori Okuma, Yun Cao Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
18Srivaths Ravi 0001, Anand Raghunathan, Nachiketh R. Potlapally, Murugan Sankaradass System design methodologies for a wireless security processing platform. Search on Bibsonomy DAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, performance, embedded system, wireless, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
18Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith Implementing a distributed firewall. Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF OpenBSD, access control, network security, distributed, IP, trust management, firewalls, IPsec, credentials, KeyNote, IKE
11Sangjin Han, Keon Jang, KyoungSoo Park, Sue B. Moon PacketShader: a GPU-accelerated software router. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF software router, GPU, CUDA
11Boniface Hicks, Sandra Julieta Rueda, Dave King 0002, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger An architecture for enforcing end-to-end access control over web applications. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF policy compliance, access control
11Ehab Al-Shaer Automated management of network access control from design to enforcement. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
11Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang Ciphertext verification security of symmetric encryption schemes. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption
11Dmitriy Kuptsov, Andrey Khurri, Andrei V. Gurtov Distributed user authentication in wireless LANs. Search on Bibsonomy WOWMOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Ehab Al-Shaer, Wilfredo Marrero, Adel El-Atawy, Khalid Elbadawi Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. Search on Bibsonomy ICNP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Yossi Gilad, Amir Herzberg Lightweight Opportunistic Tunneling (LOT). Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Tae H. Oh, Sumita Mishra, Yin Pan Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool. Search on Bibsonomy SIGITE Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF haipe, modeling and simulation., security, opnet
11Jingnan Yao, Jiani Guo, Laxmi N. Bhuyan Ordered Round-Robin: An Efficient Sequence Preserving Packet Scheduler. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Antonio Liotta, Daniel H. Tyrode-Goilo, Adetola Oredope Open Source Mobile VPNs over Converged All-IP Networks. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mobile VPNs, Mobility, IMS, Handovers, MIPv6
11Sandra Julieta Rueda, Yogesh Sreenivasan, Trent Jaeger Flexible security configuration for virtual machines. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, virtual machines, policy, compliance
11Frederik Armknecht, Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Gianluca Ramunno, Davide Vernizzi An efficient implementation of trusted channels based on openssl. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF openSSL, transport layer security (TLS), trusted channel, trusted computing (TC), attestation
11Chwan-Hwa John Wu, Tong Liu Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion
11Kurt Dietrich A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Ningning Lu, Huachun Zhou, Yajuan Qin A comparison study of IKE protocols. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IKEv1, authentication keywords, pre-shared-key, cookie, IKEv2
11Barnabas Ndlovu Gatsheni, Zwelakhe Mabizela A High Speed Mobile Courier Data Access System That Processes Database Queries in Real-Time. Search on Bibsonomy ICIC (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie, Kyandoghere Kyamakya Secure Message Relay over Networks with QKD-Links. Search on Bibsonomy ICQNM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Stefan Lindskog, Anna Brunström The Design and Message Complexity of Secure Socket SCTP. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF packet protection, security differentiation, SCTP, protocol design, message complexity, end-to-end security
11Vittorio Cortellessa, Catia Trubiani Towards a library of composable models to estimate the performance of security solutions. Search on Bibsonomy WOSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tradeoff between performance and security, software security, model composition, generalized stochastic petri nets, software performance modeling
11Kenneth G. Paterson, Gaven J. Watson Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Steven Davy, Brendan Jennings, John Strassner Using an Information Model and Associated Ontology for Selection of Policies for Conflict Analysis. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Policy Conflict Analysis, Policy Selection
11Roberto D. Rubino An open system for transparent firewall authentication and user traffic identification within corporate intranets. Search on Bibsonomy SIGITE Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, firewalls, packet marking
11Lars Völker, Christoph Werle, Martina Zitterbart Decision process for automated selection of security protocols. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu CLID: A general approach to validate security policies in a dynamic network. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Arnab Roy 0001, Anupam Datta, John C. Mitchell Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. Search on Bibsonomy TGC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Lari Iso-Anttila, Jorma Ylinen, Pekka Loula A Proposal to Improve IKEv2 negotiation. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Assed Jehangir, Sonia M. Heemstra de Groot Securing inter-cluster communication in Personal Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Henry Haverinen, Jonne Siren, Pasi Eronen Energy Consumption of Always-On Applications in WCDMA Networks. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Pantelis A. Frangoudis, Vasileios P. Kemerlis, Dimitrios C. Paraskevaidis, Elias C. Efstathiou, George C. Polyzos Experimental evaluation of community-based WLAN voice and data services. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure VoIP, performance measurements, community networks, wi-fi networks
11Matthias Ganzinger, William J. Hymas, Thomas Schutt Securing Broadcast Based Ad Hoc Routing Protocols. Search on Bibsonomy PerCom Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Kazuhiro Matsuda Ring-Based Virtual Private Network Supporting a Large Number of VPNs. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Eun-Chul Cha, Hyoung-Kee Choi, Sung-Jae Cho Evaluation of Security Protocols for the Session Initiation Protocol. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Kenneth G. Paterson, Arnold K. L. Yau Lost in translation: theory and practice in cryptography. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Chi-Hoon Shin, Soo-Cheol Oh, Dae-Won Kim, Sunwook Kim, Kyoung Park, Sung-Woon Kim LATONA: An Advanced Server Architecture for Ubiquitous Sensor Network. Search on Bibsonomy SAMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Hazem H. Hamed, Ehab Al-Shaer Dynamic rule-ordering optimization for high-speed firewall filtering. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Sandro Grech, Henry Haverinen, Vijay Devarapalli Towards Service Continuity in Emerging Heterogeneous Mobile Networks. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Thomas Berger Analysis of Current VPN Technologies. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Muhammad Sher, Thomas Magedanz, Walter T. Penzhorn Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS). Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Inter-Domains Security, Trust Relationship, IP Multimedia System (IMS), Keys and Certificate Management
11Ricardo Nabhen, Carlos Maziero Some Experiences in Using Virtual Machines for Teaching Computer Networks. Search on Bibsonomy Education for the 21st Century The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11David E. Lapsley, Marcos Bergamo An integrated approach to the development of wireless network protocols. Search on Bibsonomy WINTECH The full citation details ... 2006 DBLP  DOI  BibTeX  RDF GNU radio, HiDSN, TCeMA, software defined radio, mathematica, NASA
11Hong-qiang Li, Chang-yun Miao Hardware Implementation of Hash Function SHA-512. Search on Bibsonomy ICICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Arlen Nascimento, Alexandre Passito, Edjair de Souza Mota, Edson Nascimento Silva Jr., Leandro S. G. de Carvalho Can I Add a Secure VoIP Call?. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Jyh-Cheng Chen, Jui-Chi Liang, Siao-Ting Wang, Shin-Ying Pan, Yin-Shin Chen, Ying-Yu Chen Fast Handoff in Mobile Virtual Private Networks. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Süheyla Ikiz, Y. Murat Erten Throughput Analysis of UDP and VPN Traffic in 802.11g Networks. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Carsten Hohendorf, Erwin P. Rathgeb, Esbold Unurkhaan, Michael Tüxen Secure End-to-End Transport over SCTP. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval The Twist-AUgmented Technique for Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Do Hyeon Lee, Jeom Goo Kim Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks. Search on Bibsonomy KES (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Jung Doo Koo, Jungsook Koo, Dong Chun Lee Secure Authentication Protocol in Mobile IPv6 Networks. Search on Bibsonomy KES (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Qianli Zhang, Xing Li On the Generation of Fast Verifiable IPv6 Addresses. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 587 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license