Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,540,181 papers from all fields of science
Search
Sign In
Create Free Account
IPsec
Known as:
Encapsulating Security Payload
, IPSecME
, ESP
Expand
Internet Protocol Security (IPsec) is a protocol suite for secure Internet Protocol (IP) communications that works by authenticating and encrypting…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
6in4
Argus - Audit Record Generation and Utilization System
Authenticated encryption
Authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
On a High-Performance and Balanced Method of Hardware Implementation for AES
Xiaotao Zhang
,
Hui Li
,
Shouwen Yang
,
Shuangshuang Han
IEEE Seventh International Conference on Software…
2013
Corpus ID: 18549832
Hardware implementation provides a higher level of security and cryptography speed at some lower resource cost, compared to…
Expand
Review
2008
Review
2008
Voice over IP Security
Patrick Park
2008
Corpus ID: 110853528
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical…
Expand
2005
2005
Secure VoIP : call establishment and media protection
Johan Bilien
,
Erik Eliasson
,
Joachim Orrblad
,
Jon-Olov Vatn
2005
Corpus ID: 19103
In this paper we study the possibility of establishing a secure VoIP telephone call using SIP. Different security services…
Expand
2005
2005
Mikro-SINA — Hands-on Experiences with the Nizza Security Architecture
C. Helmuth
,
Alexander Warg
,
Norman Feske
2005
Corpus ID: 12217920
Key components of today’s network communication infrastructure of German embassies, called Secure Inter-Network Architecture…
Expand
2005
2005
RSA & Public Key Cryptography in FPGAs
M. Langhammer
2005
Corpus ID: 1834720
In this paper an RSA calculation architecture is proposed for FPGAs that addresses the issues of scalability, flexible…
Expand
2004
2004
Towards an algebraic approach to solve policy conflicts
C. Basile
,
A. Lioy
2004
Corpus ID: 12035335
Policy-based security is one of the most innovative area in the security arena. A policy represents the high level targets and is…
Expand
2001
2001
Demystifying The Ipsec Puzzle
S. Frankel
2001
Corpus ID: 107771420
From the Publisher: Now that the Internet has blossomed into the "Information Superhighway" with its traffic and drivers…
Expand
Review
2000
Review
2000
An Internet infrastructure for cellular CDMA networks using mobile IP
P. McCann
,
T. Hiller
IEEE wireless communications
2000
Corpus ID: 16374834
The CDMA community, under the umbrella of the 3rd Generation Partnership Project 2, has embarked on a standardization effort for…
Expand
2000
2000
FPGA-based Cryptography for Internet Security ∗∗∗∗
V. Prasanna
,
Andreas Dandalis
2000
Corpus ID: 17957233
The enormous advances in network technology have resulted in an amazing potential for changing the way we communicate and do…
Expand
1997
1997
Secure mobile IP using IP security primitives
Atsushi Inoue
,
Masahiro Ishiyama
,
Atsushi Fukumoto
,
Toshio Okamoto
Proceedings of IEEE 6th Workshop on Enabling…
1997
Corpus ID: 11752114
As the commercial use of the Internet becomes common and the demand for mobile computing through the Internet is emerging, it is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE