The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for IPSec with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2000 (28) 2001 (21) 2002 (28) 2003 (46) 2004 (50) 2005 (84) 2006 (53) 2007 (47) 2008 (39) 2009 (34) 2010 (26) 2011 (17) 2012-2013 (22) 2014-2015 (20) 2016-2017 (16) 2018-2019 (24) 2020-2021 (16) 2022-2023 (16)
Publication types (Num. hits)
article(154) incollection(8) inproceedings(424) phdthesis(1)
Venues (Conferences, Journals, ...)
RFC(54) LCN(10) SAINT Workshops(9) Security Protocols Workshop(9) ESORICS(8) ISCC(8) AINA(7) SECRYPT(7) CCS(6) NDSS(6) ARES(5) CoRR(5) IACR Cryptol. ePrint Arch.(5) ICC(5) IEEE Access(5) NETWORKING(5) More (+10 of total 334)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 447 occurrences of 240 keywords

Results
Found 587 publication records. Showing 587 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Guy Gogniat, Tilman Wolf, Wayne P. Burleson Reconfigurable Security Support for Embedded Systems. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Shinya Masuda, Hidekazu Suzuki, Naonobu Okazaki, Akira Watanabe Proposal for a Practical Cipher Communication Protocol That Can Coexist with NAT and Firewalls. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Daesung Lee 0001, Ki-Chang Kim, Year Back Yoo IPBio: Embedding Biometric Data in IP Header for Per-Packet Authentication. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Jianzhong Huang 0001, Changsheng Xie, Xu Li iOBS3: An iSCSI-Based Object Storage Security System. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Jens Tölle, Harald Schmidt Simultaneous Support of Multiple Security Protocols in a Group Communication Gateway. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 A Client-Transparent Approach to Defend Against Denial of Service Attacks. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers
11Ashutosh Dutta, Tao Zhang 0005, Sunil Madhani, Kenichi Taniuchi, Kensaku Fujimoto, Yasuhiro Katsube, Yoshihiro Ohba, Henning Schulzrinne Secure universal mobility for wireless Internet. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Stéphane Vialle, Amelia De Vivo, Fabrice Sabatier A Grid Architecture for Comfortable Robot Control. Search on Bibsonomy EGC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Haralambos Michail, Athanasios Kakarountas, George N. Selimis, Costas E. Goutis Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study. Search on Bibsonomy PATMOS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Yohei Hasegawa, Shohei Abe, Katsuaki Deguchi, Masayasu Suzuki, Hideharu Amano Time-multiplexed execution on the dynamically reconfigurable processor: a performance/cost evaluation. Search on Bibsonomy FPGA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han Performance Analysis of Audio Streaming in Secure Wireless Access Network. Search on Bibsonomy ACIS-ICIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr Formal prototyping in early stages of protocol design. Search on Bibsonomy WITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11William Joseph Adams, George C. Hadjichristofi, Nathaniel J. Davis IV Calculating a node's reputation in a mobile ad hoc network. Search on Bibsonomy IPCCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Adetola Oredope, Antonio Liotta, Kun Yang 0001, Daniel H. Tyrode-Goilo Experimental Evaluation of the IP Multimedia Subsystem. Search on Bibsonomy IPOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Stefan Chevul, Lennart Isaksson, Markus Fiedler, Peter Lindberg Measurement of Application-Perceived Throughput of an E2E VPN Connection Using a GPRS Network. Search on Bibsonomy EuroNGI Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Jochen Eisinger, Peter Winterer, Bernd Becker 0001 Securing Wireless Networks in a University Environment. Search on Bibsonomy PerCom Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Norihito Fujita, Yuichi Ishikawa, Toshio Koide, Akira Tsukamoto Scalable Overlay Network Deployment for Dynamic Collaborative Groups. Search on Bibsonomy SAINT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Shinsuke Suzuki, Satoshi Kondo Dynamic Network Separation for IPv6 Network Security Enhancement. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Alvaro Vives, Jordi Palet IPv6 Distributed Security: Problem Statement. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Pascal Urien, Mesmin Dandjinou The OpenEapSmartcard platform. Search on Bibsonomy Net-Con The full citation details ... 2005 DBLP  DOI  BibTeX  RDF javacards, Security, WLAN, smartcards
11Patroklos G. Argyroudis, Donal O'Mahony Towards Flexible Authorization Management. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Hannes Tschofenig, Andrei V. Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam Traversing Middleboxes with the Host Identity Protocol. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine Privacy Vulnerabilities in Encrypted HTTP Streams. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Haralambos Michail, Athanasios P. Kakarountas, Odysseas G. Koufopavlou, Constantinos E. Goutis A low-power and high-throughput implementation of the SHA-1 hash function. Search on Bibsonomy ISCAS (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Seung-Yeon Lee, Eui-nam Huh, Sangbok Kim, Youngsong Mun An Efficient Performance Enhancement Scheme for Fast Mobility Service in MIPv6. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han Evaluation of Audio Streaming in Secure Wireless Access Network. Search on Bibsonomy Panhellenic Conference on Informatics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Gabriel López Millán, Félix J. García Clemente, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Chang-Chun Cheng, Wei-Ming Chen, Han-Chieh Chao, Yao-Po Wang FPGA Authentication Header (AH) Implementation for Internet Appliances. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Tim Good, Mohammed Benaissa AES on FPGA from the Fastest to the Smallest. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF low area, Application Specific Instruction Processor (ASIP), Field Programmable Gate Array (FPGA), pipelined, Advanced Encryption Standard (AES), finite field, high throughput, design exploration
11Carmelo Floridia, Stefano Giordano, Stefano Lucetti, Andrea Tomasi An Experience in IPv6 Networking supporting Ecumene Web Information System for Cultural Heritage. Search on Bibsonomy TRIDENTCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Félix J. García Clemente, Jesús D. Jiménez Re, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta Policy-Driven Routing Management Using CIM. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han Framework for Secure Audio Streaming to Wireless Access Network. Search on Bibsonomy Systems Communications The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Alireza Hodjat, Ingrid Verbauwhede High-Throughput Programmable Cryptocoprocessor. Search on Bibsonomy IEEE Micro The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Jim Hughes IEEE Standard for Encrypted Storage. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Michael P. Howarth, Sunil Iyengar, Zhili Sun, Haitham S. Cruickshank Dynamics of key management in secure satellite multicast. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Esbold Unurkhaan, Erwin P. Rathgeb, Andreas Jungmaier Secure SCTP - A Versatile Secure Transport Protocol. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF transport protocol security, SCTP, end-to-end security
11Patroklos G. Argyroudis, Raja Verma, Hitesh Tewari, Donal O'Mahony Performance Analysis of Cryptographic Protocols on Handheld Devices. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Gustave Anderson, Leonardo F. Urbano, Gaurav Naik, David J. Dorsey, Andrew Mroczkowski, Donovan Artz, Nicholas Morizio, Andrew Burnheimer, Kris Malfettone, Daniel Lapadat, Evan Sultanik, Saturnino Garcia, Maxim Peysakhov, William C. Regli, Moshe Kam A Secure Wireless Agent-based Testbed. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Yingfei Dong, Changho Choi, Zhi-Li Zhang Secure Name Service: A Framework for Protecting Critical Internet Resources. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Kaisa Nyberg IKE in Ad Hoc IP Networking. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ad hoc access, ad hoc authentication, ad hoc networking, key management, message authentication code, peer-to-peer communication, security association, IKEv2
11Ashutosh Dutta, Tao Zhang 0005, Sunil Madhani, Kenichi Taniuchi, Kensaku Fujimoto, Yasuhiro Katsube, Yoshihiro Ohba, Henning Schulzrinne Secure universal mobility for wireless internet. Search on Bibsonomy WMASH The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, mobility, 802.11, mobile IP, handoff, hot spot
11Mao-Yin Wang, Chih-Pin Su, Chih-Tsun Huang, Cheng-Wen Wu An HMAC processor with integrated SHA-1 and MD5 algorithms. Search on Bibsonomy ASP-DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Sashisu Bajracharya, Chang Shu 0003, Kris Gaj, Tarek A. El-Ghazawi Implementation of Elliptic Curve Cryptosystems over GF(2n) in Optimal Normal Basis on a Reconfigurable Computer. Search on Bibsonomy FPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Tadayoshi Kohno, John Viega, Doug Whiting CWC: A High-Performance Conventional Authenticated Encryption Mode. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Szabolcs Szigeti, Peter Risztics Will IPv6 Bring Better Security? Search on Bibsonomy EUROMICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Changnam Kim, Young Sin Kim, Eui-nam Huh, Youngsong Mun Performance Improvement in Mobile IPv6 Using AAA and Fast Handoff. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Kwang-Hee Lee, Hoon Choi FSL3/4 on NEDIA (Flow Separation by Layer 3/4 on Network Environment Using Dual IP Addresses). Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Kenneth L. Calvert, Jim Griffioen, Billy Mullins, Leonid B. Poutievski, Amit Sehgal Secure, Customizable, Many-to-One Communication. Search on Bibsonomy IWAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Ajmal S. Mian, Ashraf Masood Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Alireza Hodjat, Patrick Schaumont, Ingrid Verbauwhede Architectural Design Features of a Programmable High Throughput AES Coprocessor. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Roar Lien, Tim Grembowski, Kris Gaj A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Catherine Meadows 0001, Dusko Pavlovic Deriving, Attacking and Defending the GDOI Protocol. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Bruno Blanchet Automatic Proof of Strong Secrecy for Security Protocols. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim Threat Analysis on NEtwork MObility (NEMO). Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Venkatesh Obanaik, Zhao Hang, Akkihebbal L. Ananda Decoupling Loss Differentiation and Loss Recovery to Ensure Security and Performance. Search on Bibsonomy LCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Performance Enhancing Proxy, TCP, Heterogeneous Network, TFRC, End-to-End Security
11Salekul Islam, J. William Atwood Security Issues in PIM-SM Link-Local Messages. Search on Bibsonomy LCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Ramesh Karri, Piyush Mishra Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks. Search on Bibsonomy PATMOS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Zhuoqing Morley Mao, David Johnson 0004, Oliver Spatscheck, Jacobus E. van der Merwe, Jia Wang Efficient and robust streaming provisioning in VPNs. Search on Bibsonomy WWW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF streaming server placement, VPNs
11Jun-ichiro itojun Hagino Implementing IPv6: experiences at KAME project. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Francesco Palmieri 0002 VPN scalability over high performance backbones Evaluating MPLS VPN against traditional approaches. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Jung Min Park, Min-Jung Jin, Kijoon Chae Secure Firewall Traversal in Mobile IP Network. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11SuGil Choi, Kwangjo Kim, ByeongGon Kim Practical Solution for Location Privacy in Mobile IPv6. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11José María Sierra, Julio César Hernández Castro, Eva Ponce, Arturo Ribagorda Protection of Multiagent Systems. Search on Bibsonomy ICCSA (3) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith The STRONGMAN Architecture. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim Dynamic Authorization and Intrusion Response in Distributed Systems. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Thorsten Aurisch, Christoph Karg A Daemon for Multicast Internet Key Exchange. Search on Bibsonomy LCN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Cédric de Launois, Aurélien Bonnet, Marc Lobelle Connection of Extruded Subnets: A Solution Based on RSIP. Search on Bibsonomy NETWORKING The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Anastasios Ioannidis, Manos Spanoudakis, Giannis Priggouris, C. Eliopoulou, Stathes Hadjiefthymiades, Lazaros F. Merakos EURO-CITI Security Manager: Supporting Transaction Services in the e-Government Domain. Search on Bibsonomy EGOV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Ingo Lück, Sebastian Vogel, Heiko Krumm Model-based configuration of VPNs. Search on Bibsonomy NOMS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Yoon-Jung Rhee, Tai-Yun Kim Practical Solutions to Key Recovery Based on PKI in IP Security. Search on Bibsonomy SAFECOMP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott, Keith D. Underwood GRIP: A Reconfigurable Architecture for Host-Based Gigabit-Rate Packet Processing. Search on Bibsonomy FCCM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli Automated Analysis of Some Security Mechanisms of SCEP. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Manel Guerrero Zapata, N. Asokan Securing ad hoc routing protocols. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF SAODV, secure AODV, security, routing protocols, ad hoc wireless networks, hash chains
11Alain Azagury, Ran Canetti, Michael Factor, Shai Halevi, Ealan Henis, Dalit Naor, Noam Rinetzky, Ohad Rodeh, Julian Satran A Two Layered Approach for Securing an Object Store Network. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Object Store Device, SAN, Storage Security
11Greg O'Shea, Michael Roe Child-proof authentication for MIPv6 (CAM). Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF IPNG, Mobility, mobile communications, IPv6
11Sanjai Narain, Ravichander Vaidyanathan, Stanley Moyer, William Stephens, Kirthika Parmeswaran, Abdul-Rahim Shareef Middleware For Building Adaptive Systems Via Configuration. Search on Bibsonomy LCTES/OM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF security, QoS, routing, middleware, network, CORBA, virtual, service, diagnosis, configuration, provisioning, private
11William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Manju V. Hegde, Morteza Naraghi-Pour, Jean Bordes, Curtis Davis, Otto Schmid, Monier Maher An Architecture for a Scalable Broadband IP Services Switch. Search on Bibsonomy ICN (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Wu Wen, Germano Caronni, Yahya Y. Al-Salqan Summary Report on Enterprise Security Workshop. Search on Bibsonomy WETICE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Lisa Wu 0001, Christopher T. Weaver, Todd M. Austin CryptoManiac: a fast flexible architecture for secure communication. Search on Bibsonomy ISCA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Michael Roe Authentication and Naming (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Deborah S. Bakin, Mario Joa-Ng, Anthony J. McAuley Quantifying TCP Performance Improvements in Noisy Environments Using Protocol Boosters. Search on Bibsonomy ISCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF protocol enhancement, Wireless, TCP, Error Control
11John Zao, Stephen T. Kent, Joshua Gahm, Gregory D. Troxel, Matthew Condell, Pam Helinek, Nina Yuan, Isidro Castiñeyra A public-key based secure Mobile IP. Search on Bibsonomy Wirel. Networks The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
11Walter Fumy Internet Security Protocols. Search on Bibsonomy State of the Art in Applied Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #587 of 587 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license