Open Access
Security Architecture for the Internet Protocol
R. Atkinson
- Vol. 1825, pp 1-101
TLDR
This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).Abstract:Ā
This document describes an updated version of the "Security
Architecture for IP", which is designed to provide security services
for traffic at the IP layer. This document obsoletes RFC 2401
(November 1998). [STANDARDS-TRACK]read more
Citations
More filters
Patent
System and method for executing commands that are non-native to the native environment of a mobile device
TL;DR: In this paper, a cross-platform event engine comprises an event module with information pertaining to various event inputs as they relate to different operating platforms and devices, which determines how to handle a particular event within an operating environment.
Patent
Packet inspection device, mobile computer and packet transfer method in mobile computing with improved mobile computer authenticity check scheme
Atsushi Inoue,Masahiro Ishiyama,Atsushi Fukumoto,Yoshiyuki Tsuda,Atsushi Shimbo,Toshio Okamoto +5 more
TL;DR: A packet transfer scheme for realizing a control of a packet inspection device to pass only packets from those mobile computers that can be recognized as authenticated among non-management target mobile computers moving inside the network, to outside the network as discussed by the authors.
Patent
Data communication method and system
TL;DR: In this paper, the authors propose a data communication method for forwarding a session control message designating a destination server with an IP address to the destination server via a session management server, wherein, when an application program or encrypted communication software on a client issues a connection request, the client or the session manager server automatically converts the IP address into a desired resource identifier identifiable a domain, thereby to determine the domain to which the received connection request message should be forwarded.
Journal ArticleDOI
An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks
Chin-Chen Chang,Hao-Chuan Tsai +1 more
TL;DR: This work proposes a self-verified mobile authentication scheme that has a novel architecture that enjoys both computational efficiency and communication efficiency that exceed the efficiencies of other recent mobile authentication schemes.
Patent
Location privacy through ip address space scrambling
TL;DR: In a network, a router uses some secret information combined with a cryptographic process in determination of a subnet's routing prefix as mentioned in this paper, and several methods are disclosed, including using an IP suffix for prefix generation and for decryption, maintaining a pool of pseudo prefixes at the router, using public key encryption and symmetric key encryption.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Key words for use in RFCs to Indicate Requirement Levels
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Journal ArticleDOI
Using encryption for authentication in large networks of computers
TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Internet Protocol, Version 6 (IPv6) Specification
S. Deering,R. Hinden +1 more
TL;DR: In this paper, the authors specify version 6 of the Internet Protocol (IPv6), also referred to as IP Next Generation or IPng, and propose a new protocol called IPng.
Internet Protocol
TL;DR: Along with TCP, IP represents the heart of the Internet protocols and has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through an internetwork; and providing fragmentation and reassembly of data links to support data links with different maximum transmission unit (MTU) sizes.