<--- Back to Details
First PageDocument Content
Computing / Tunneling protocols / Internet protocols / IPsec / Network protocols / Internet Security Association and Key Management Protocol / Mobile IP / Security association / Network layer / Cryptographic protocols / Data / Network architecture
Date: 2005-01-06 12:57:28
Computing
Tunneling protocols
Internet protocols
IPsec
Network protocols
Internet Security Association and Key Management Protocol
Mobile IP
Security association
Network layer
Cryptographic protocols
Data
Network architecture

Mobile Multi-Layered IPsec Heesook Choi, Hui Song, Guohong Cao, and Tom La Porta Department of Computer Science & Engineering The Pennsylvania State University University Park, PA[removed]Email: {hchoi,hsong,gcao,tlp}@cse.

Add to Reading List

Source URL: www.cse.psu.edu

Download Document from Source Website

File Size: 799,71 KB

Share Document on Facebook

Similar Documents

A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols Mirja K¨uhlewind∗ , Tobias B¨uhler∗ , Brian Trammell∗ , Stephan Neuhaus† , Roman M¨untener† , and Gorry Fairhurst‡ ∗ ETH

A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols Mirja K¨uhlewind∗ , Tobias B¨uhler∗ , Brian Trammell∗ , Stephan Neuhaus† , Roman M¨untener† , and Gorry Fairhurst‡ ∗ ETH

DocID: 1xU3p - View Document

Communication Protocols for Underwater Data Collection using a Robotic Sensor Network Geoffrey A. Hollinger, Member, IEEE, Sunav Choudhary, Student Member, IEEE, Parastoo Qarabaqi, Student Member, IEEE, Christopher Murph

Communication Protocols for Underwater Data Collection using a Robotic Sensor Network Geoffrey A. Hollinger, Member, IEEE, Sunav Choudhary, Student Member, IEEE, Parastoo Qarabaqi, Student Member, IEEE, Christopher Murph

DocID: 1vl6P - View Document

A Language-theoretic View on Network Protocols Pierre Ganty1 , Boris Köpf1 , and Pedro Valero1,2 1 IMDEA Software Institute, Madrid, Spain Universidad Politécnica de Madrid, Spain

A Language-theoretic View on Network Protocols Pierre Ganty1 , Boris Köpf1 , and Pedro Valero1,2 1 IMDEA Software Institute, Madrid, Spain Universidad Politécnica de Madrid, Spain

DocID: 1vk92 - View Document

Network instruction Wireless network is prepared at the multi-purpose hall. Settings are as follows: SSID: emis2012 Password: emis2012matsue Supported wireless and security protocols are 802.11a/b/g with WEP(128bit),

Network instruction Wireless network is prepared at the multi-purpose hall. Settings are as follows: SSID: emis2012 Password: emis2012matsue Supported wireless and security protocols are 802.11a/b/g with WEP(128bit),

DocID: 1vinH - View Document

International Journal of Advanced Networking & Applications (IJANA)  ISSN: A Scheduled Based MAC Protocols for Wireless Sensor Network: A Survey

International Journal of Advanced Networking & Applications (IJANA) ISSN: A Scheduled Based MAC Protocols for Wireless Sensor Network: A Survey

DocID: 1uUG8 - View Document