Back to Results
First PageMeta Content
Network protocols / Cryptographic protocols / IPv6 / Internet Protocol / Tunneling protocols / Mobile IP / Proxy Mobile IPv6 / IPsec / Internet Key Exchange / Network architecture / Computing / Data


Child-proof Authentication for MIPv6 (CAM) Michael Roe Greg O’Shea Microsoft Research Ltd St George House, 1 Guildhall Street
Add to Reading List

Document Date: 2010-08-20 09:24:35


Open Document

File Size: 83,62 KB

Share Result on Facebook

City

Cambridge / /

Company

Thomson / Mobile IPv6 / Microsoft Research Ltd / Needham / Roe Greg O’Shea Microsoft Research Ltd / /

Currency

USD / /

/

Event

FDA Phase / Product Recall / Product Issues / /

Facility

Lancaster University / Federal Information Processing Standard FIPS PUB / /

IndustryTerm

higher level software / authentication protocol / experimental networks / mobile communications / hash algorithm / foreign network / unilateral authentication protocol / web-based applications / simpler solution / Internet Protocol / Internet Engineering Task We / Internet Key Exchange / authentication protocols / public key distribution protocol / /

Organization

Lancaster University / Internet Engineering Task Force / IPSEC / Royal Society / /

Person

Phil Zimmerman / Stefan Schmid / Richard Black / Carl Ellison / Christian Huitema / Jeff Schiller / Richard Draves / Andrew Scott / Doug Shepherd / Cedric Fournet / Dieter Gollmann / Joe Finney / Roger Needham / /

/

Position

correspondent / /

Product

PKm / MIPv6 / IPv4 / IPv6 / /

PublishedMedium

Proceedings of the Royal Society / /

Technology

SNMP / home network / authentication protocol / IPv6 / hash algorithm / private key / secret key / CAM-like protocol / R. Internet Protocol / SSL / IPv6 protocol / CAM protocol / then alternative protocols / public key / DNS / Internet Protocol / authentication protocols / SHA1 algorithm / public key distribution protocol / unilateral authentication protocol / Network Time Protocol / IPv4 / MIPv6 protocol / /

URL

http /

SocialTag