Dell / IPsec SA. / ML-IKE Create SA / MLIKE Create SA / P ROCESSING T IME Message Flow ISAKMP SA / MML-IPsec Create SA / ISAKMP SA. / PKD Key Distribute Reply(4) ISAKMP SA / Mobile IP Registration Request (2) ISAKMP SA / One SA / IKE Create SA / Reply(4) PKD Key Distribute(3) ISAKMP SA / Mobile IP Registration Reply(3) ISAKMP SA / Guohong / /
Currency
pence / / /
Event
FDA Phase / /
Facility
Portland University / IPsec tunnel / Helsinki University of Technology / ML-IPsec tunnel / Mobile IP tunnel / IP TCP Data Base Station / MML-IPsec tunnel / /
IndustryTerm
access routers / security server / wireless edge resulting / performance enhancing algorithms / software platform / security processing / mobility protocol / key distribution protocol / classic data communication protocols / client software / wireless network / Internet HA MH / remote ftp site / wireless link / wide area network / 3DES encryption algorithm / 3G wireless links / wireless configuration parameters / encryption protocol / mobility protocols / wireless loss / possible solutions / automatic key management protocols / Internet model / worthwhile protocol / foreign network / wireless networks / message processing time / wireless edge / forward packet processing / local packet processing / wireless data / trusted privileged key management applications / packet processing / wireless cards / wireless errorprone environment / Internet transport protocol / ftp server / wireless link conditions / normal packet processing time / wireless service providers / wireless environment show / proposed protocol / wireless enhancements / post-processing / wireless environment / mobility management / wireless links / smart processing / authorized intermediate routers / wireless system performance / application layer protocols / pre-processing / smart packet processing / /
OperatingSystem
Unix / BSD/OS / Linux / BSD / GNU / /
Organization
Tom La Porta Department of Computer Science / U.S. Securities and Exchange Commission / Helsinki University of Technology / Portland University / Security Association / Data Security Association / DKM BS2 Security Association / DKM Security Association / The Pennsylvania State University University / /
Person
Tom La Porta / Hui Song / / /
Position
ip_forward / correspondent / forward / Cao / /
Product
Linux / Linux FreeS/WAN version 1.99 / IPsec/Mobile IP solution / SNOOP drops / Mobile / MML-IPsec / Linux FreeS/WAN 1.99 / KEYv2 / IPsec/Mobile / /
Technology
home network / application layer protocols / tunnel-mode ESP protocol / packet encryption / key exchange protocol / classic data communication protocols / DKM protocol / key distribution protocol / tunnel-mode ESP encryption protocol / Unix / Linux / worthwhile protocol / key exchange protocols / VPN / key distribution algorithm / two mobility protocols / two protocols / secret key / operating system / ESP 3DES encryption algorithm / performance enhancing algorithms / automatic key management protocols / SSL / key management protocols / WAN / mobility protocol / Internet ftp.RedHat.com CSE Department Backbone Department Router / TCP/IP / Internet transport protocol / resulting protocol / encryption / Ethernet / authorized intermediate routers / DNS / firewall / previously proposed protocol / Encryption Protocol / caching / access routers / integrating performance enhancing algorithms / 3G / SNOOP protocol / /