18 results on '"Nir, Y"'
Search Results
2. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier
3. Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2)
4. ChaCha20 and Poly1305 for IETF Protocols
5. Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)
6. Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)
7. Curve25519 and Curve448 for the Internet Key Exchange Protocol Version 2 (IKEv2) Key Agreement
8. Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks
9. ChaCha20, Poly1305, and Their Use in the Internet Key Exchange Protocol (IKE) and IPsec
10. ChaCha20 and Poly1305 for IETF Protocols
11. Internet Key Exchange Protocol Version 2 (IKEv2)
12. An Internet Key Exchange Protocol Version 2 (IKEv2) Extension to Support EAP Re-authentication Protocol (ERP)
13. Handover Keying (HOKEY) Architecture Design
14. Protocol Support for High Availability of IKEv2/IPsec
15. A Childless Initiation of the Internet Key Exchange Version 2 (IKEv2) Security Association (SA)
16. IPsec Cluster Problem Statement
17. Internet Key Exchange Protocol Version 2 (IKEv2)
18. Repeated Authentication in Internet Key Exchange (IKEv2) Protocol
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.