Open Access
Security Architecture for the Internet Protocol
R. Atkinson
- Vol. 1825, pp 1-101
TLDR
This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).Abstract:
This document describes an updated version of the "Security
Architecture for IP", which is designed to provide security services
for traffic at the IP layer. This document obsoletes RFC 2401
(November 1998). [STANDARDS-TRACK]read more
Citations
More filters
Patent
Distributed caching for resource and mobile network traffic management
Michael Luna,John Haines +1 more
TL;DR: In this article, the authors present a distributed proxy and cache system for resource and mobile network traffic management, including means for detecting a first data request made by a first mobile application on a mobile device; means for retrieving cached elements stored in a local cache on the mobile device to respond to the first request; and/or means for, establishing connectivity of the mobile devices to the wireless network to satisfy the second request made.
Proceedings Article
Speeding up Secure Web Transactions Using Elliptic Curve Cryptography.
TL;DR: The results show that an Apache web server can handle 11%-31% more HTTPS requests per second when using ECC rather than RSA at short-term security levels, and at security levels necessary to protect data beyond 2010, the use of ECC over RSA improves server performance by 110%-279% under realistic workloads.
Patent
Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system
TL;DR: In this paper, a method for generating a report for a network operator, which may be implemented on a system, including tracking optimization efficiency for traffic in a wireless network, generating the report to be provided to the network operator based on the optimization efficiency.
Patent
Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
TL;DR: In this article, flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation are disclosed, one embodiment includes a method of integration of content caching with a network operator, including detecting a poll from an application on a mobile device which would have been served using a cache element from a local cache on the mobile device.
Proceedings ArticleDOI
On the (in)security of IPsec in MAC-then-encrypt configurations
TL;DR: Efficient, plaintext-recovering attacks against all configurations of IPsec in which integrity protection is applied prior to encryption -- so-called MAC-then-encrypt configurations are described.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Key words for use in RFCs to Indicate Requirement Levels
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Journal ArticleDOI
Using encryption for authentication in large networks of computers
TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Internet Protocol, Version 6 (IPv6) Specification
S. Deering,R. Hinden +1 more
TL;DR: In this paper, the authors specify version 6 of the Internet Protocol (IPv6), also referred to as IP Next Generation or IPng, and propose a new protocol called IPng.
Internet Protocol
TL;DR: Along with TCP, IP represents the heart of the Internet protocols and has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through an internetwork; and providing fragmentation and reassembly of data links to support data links with different maximum transmission unit (MTU) sizes.