Amanote Research

Amanote Research

    RegisterSign In

IS-IS Cryptographic Authentication

doi 10.17487/rfc5304
Full Text
Open PDF
Abstract

Available in full text

Date

October 1, 2008

Authors
T. LiR. Atkinson
Publisher

RFC Editor


Related search

Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication

2003English

What Is...a Cryptographic Boolean Function?

Notices of the American Mathematical Society
Mathematics
2019English

Authentication-Results Registration for Differentiating Among Cryptographic Results

2010English

Biometric Person Authentication Is a Multiple Classifier Problem

English

Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol

International Journal of Information Security
Information SystemsRiskComputer NetworksCommunicationsReliabilitySafetyQualitySoftware
2016English

Next Generation Electronic Passport Scheme Using Cryptographic Authentication Protocols and Multiple Biometrics Technology

International Journal of Information Engineering and Electronic Business
2013English

Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)

2007English

MFA Is a Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies

2020English

Implementation of Secure Authentication Mechanism for LBS Using Best Encryption Technique on the Bases of Performance Analysis of Cryptographic Algorithms

International Journal of Security, Privacy and Trust Management
2012English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy