-
4
-
-
61649084095
-
-
RFC 5206, IETF
-
P. Nikander, T. Henderson, C. Vogt, and J. Arkko, "End-Host Mobility and Multihoming with the Host Identity Protocol," RFC 5206, IETF, 2008.
-
(2008)
End-host Mobility and Multihoming with the Host Identity Protocol
-
-
Nikander, P.1
Henderson, T.2
Vogt, C.3
Arkko, J.4
-
5
-
-
63749085763
-
-
RFC 5202, IETF
-
P. Jokela, R. Moskowitz, and P. Nikander, "Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP)," RFC 5202, IETF, 2008.
-
(2008)
Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP)
-
-
Jokela, P.1
Moskowitz, R.2
Nikander, P.3
-
6
-
-
33746690237
-
-
RFC 4944, IETF
-
G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks," RFC 4944, IETF, 2007.
-
(2007)
Transmission of IPv6 Packets over IEEE 802.15.4 Networks
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
7
-
-
84879533211
-
6LoWPAN fragmentation attacks and mitigation mechanisms
-
R. Hummen, J. Hiller, H. Wirtz, M. Henze, H. Shafagh, and K. Wehrle, "6LoWPAN Fragmentation Attacks and Mitigation Mechanisms," in Proc. of ACM WiSec, 2013.
-
(2013)
Proc. of ACM WiSec
-
-
Hummen, R.1
Hiller, J.2
Wirtz, H.3
Henze, M.4
Shafagh, H.5
Wehrle, K.6
-
8
-
-
63749119965
-
-
RFC 5338, IETF
-
T. Henderson, P. Nikander, and M. Komu, "Using the Host Identity Protocol with Legacy Applications," RFC 5338, IETF, 2008.
-
(2008)
Using the Host Identity Protocol with Legacy Applications
-
-
Henderson, T.1
Nikander, P.2
Komu, M.3
-
10
-
-
33751508709
-
-
NIST Special Publication 800-57, National Institute of Standards and Technology
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "Recommendation for Key Management-Part 1: General (Revision 3)," NIST Special Publication 800-57, National Institute of Standards and Technology, 2012.
-
(2012)
Recommendation for Key Management-Part 1: General (Revision 3)
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
12
-
-
0034239053
-
Evaluation of crtp performance over cellular radio links
-
M. Degermark, H. Hannu, L. Jonsson, and K. Svanbro, "Evaluation of CRTP Performance over Cellular Radio Links," IEEE Pers. Commun., vol. 7, no. 4, 2000.
-
(2000)
IEEE Pers. Commun.
, vol.7
, Issue.4
-
-
Degermark, M.1
Hannu, H.2
Jonsson, L.3
Svanbro, K.4
-
15
-
-
80052447165
-
Securing communication in 6lowpan with compressed ipsec
-
S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing Communication in 6LoWPAN with Compressed IPsec," in Proc. of IEEE DCOSS, 2011.
-
(2011)
Proc. of IEEE DCOSS
-
-
Raza, S.1
Duquennoy, S.2
Chung, T.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
16
-
-
84988829345
-
Compression of ipsec ah and esp headers for constrained environments
-
S. Raza, S. Duquennoy, and G. Selander, "Compression of IPsec AH and ESP Headers for Constrained Environments," draft-raza-6lowpanipsec-00 (WiP), IETF, 2013.
-
(2013)
Draft-raza-6lowpanipsec-00 (WiP), IETF
-
-
Raza, S.1
Duquennoy, S.2
Selander, G.3
-
17
-
-
1642279092
-
-
RFC 3173
-
A. Shacham, B. Monsour, R. Pereira, and M. Thomas, "IP Payload Compression Protocol (IPComp)," RFC 3173, 2001.
-
(2001)
IP Payload Compression Protocol (IPComp)
-
-
Shacham, A.1
Monsour, B.2
Pereira, R.3
Thomas, M.4
-
18
-
-
77954854566
-
-
RFC 5795, IETF
-
K. Sandlund, G. Pelletier, and L.-E. Jonsson, "The RObust Header Compression (ROHC) Framework," RFC 5795, IETF, 2010.
-
(2010)
The RObust Header Compression (ROHC) Framework
-
-
Sandlund, K.1
Pelletier, G.2
Jonsson, L.-E.3
-
22
-
-
84879548737
-
Towards viable certificate-based authentication for the web of things
-
R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, "Towards Viable Certificate-based Authentication for the Web of Things," in Proc. of ACM HotWiSec, 2013.
-
(2013)
Proc. of ACM HotWiSec
-
-
Hummen, R.1
Ziegeldorf, J.H.2
Shafagh, H.3
Raza, S.4
Wehrle, K.5
-
23
-
-
84896743669
-
Tailoring end-to-end ip security protocols to the internet of things
-
R. Hummen, H. Wirtz, J. H. Ziegeldorf, J. Hiller, and K. Wehrle, "Tailoring End-to-End IP Security Protocols to the Internet of Things," in Proc. of IEEE ICNP, 2013.
-
(2013)
Proc. of IEEE ICNP
-
-
Hummen, R.1
Wirtz, H.2
Ziegeldorf, J.H.3
Hiller, J.4
Wehrle, K.5
|