Clusters of Re-used Keys. | 0 | 0.34 | 2018 |
Low-Power Wide Area Network (LPWAN) Overview. | 0 | 0.34 | 2018 |
Report from the Internet of Things Software Update (IoTSU) Workshop 2016. | 0 | 0.34 | 2017 |
Report from the Strengthening the Internet (STRINT) Workshop. | 0 | 0.34 | 2015 |
HTTP Origin-Bound Authentication (HOBA). | 0 | 0.34 | 2015 |
Pervasive Monitoring Is an Attack. | 0 | 0.34 | 2014 |
Naming Things with Hashes | 16 | 1.03 | 2013 |
Bundle Security Protocol Specification. | 0 | 0.34 | 2011 |
Other Certificates Extension. | 0 | 0.34 | 2009 |
Licklider Transmission Protocol - Motivation. | 0 | 0.34 | 2008 |
Licklider Transmission Protocol - Specification. | 0 | 0.34 | 2008 |
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. | 0 | 0.34 | 2008 |
Activity management as a web service | 11 | 0.97 | 2006 |
Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP). | 0 | 0.34 | 2005 |
Securely Available Credentials Protocol. | 0 | 0.34 | 2004 |
Securely Available Credentials - Requirements | 9 | 3.41 | 2001 |
Reuse of CMS Content Encryption Keys | 1 | 0.35 | 2001 |
AAA Authorization Framework | 84 | 8.60 | 2000 |
AAA Authorization Application Examples | 23 | 2.75 | 2000 |
AAA Authorization Requirements | 12 | 0.92 | 2000 |