Open Access
Security Architecture for the Internet Protocol
R. Atkinson
- Vol. 1825, pp 1-101
Reads0
Chats0
TLDR
This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).Abstract:
This document describes an updated version of the "Security
Architecture for IP", which is designed to provide security services
for traffic at the IP layer. This document obsoletes RFC 2401
(November 1998). [STANDARDS-TRACK]read more
Citations
More filters
Patent
Systems and Methods for Secure Transaction Management and Electronic Rights Protection
TL;DR: In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.
RTP: A Transport Protocol for Real-Time Applications
TL;DR: RTP provides end-to-end network transport functions suitable for applications transmitting real-time data over multicast or unicast network services and is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks.
Book ChapterDOI
SIP: Session Initiation Protocol
Jonathan Rosenberg,Henning Schulzrinne,G. Camarillo,Alan B. Johnston,J. Peterson,Robert Sparks,Mark Handley,Eve M. Schooler +7 more
TL;DR: Session Initiation Protocol (SIP) as discussed by the authors is an application layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants, such as Internet telephone calls, multimedia distribution, and multimedia conferences.
Book ChapterDOI
Keying Hash Functions for Message Authentication
TL;DR: Two new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths.
Journal ArticleDOI
Promoting the use of end-to-end congestion control in the Internet
Sally Floyd,Kevin Fall +1 more
TL;DR: It is argued that router mechanisms are needed to identify and restrict the bandwidth of selected high-bandwidth best-effort flows in times of congestion, and several general approaches are discussed for identifying those flows suitable for bandwidth regulation.
References
More filters
HMAC-MD5 IP Authentication with Replay Prevention
M. Oehler,R. Glenn +1 more
TL;DR: This document describes a keyed-MD5 transform to be used in conjunction with the IP Authentication Header [RFC-1826] and an option is also specified to guard against replay attacks.
Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2)
J. Galvin,Keith McCloghrie +1 more
TL;DR: It is the purpose of this document, Security Protocols for SNMPv2, to define one such authentication and one such privacy protocol.
Proceedings Article
The Architecture and Implementation of Network Layer Security in UNIX.
John Ioannidis,Matt Blaze +1 more
U.S. Department of Defense Security Options for the Internet Protocol
TL;DR: This RFC specifies the U.S. Department of Defense Basic Security Option and the top-level description of the Extended Security Option for use with the Internet Protocol and obsoletes RFC 1038 "Revised IP Security Option", dated January 1988.
Report of IAB Workshop on Security in the Internet Architecture - February 8-10, 1994
TL;DR: This document is a report on an Internet architecture workshop, initiated by the IAB and held at USC Information Sciences Institute on February 8-10, 1994, focused on security issues in the Internet architecture.