"Guidance for Light-Weight Implementations of the Internet Protocol Suite" -...
2013-02-25, rev -03: Implementation of Internet protocols on small devices benefits from light-weight implementation techniques, which are often not documented in an accessible way.
View Article"Minimal IKEv2" - Tero Kivinen
2013-04-11, rev -00: This document describes minimal version of the Internet Key Exchange version 2 (IKEv2) protocol. IKEv2 is a component of IPsec used for performing mutual authentication and...
View Article"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...
2013-04-22, rev -04: The Internet Protocol Suite is increasingly used on small devices with severe constraints, creating constrained node networks. This document provides a number of basic terms that...
View Article"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...
2013-07-01, rev -05: The Internet Protocol Suite is increasingly used on small devices with severe constraints, creating constrained node networks. This document provides a number of basic terms that...
View Article"Guidance for Light-Weight Implementations of the Internet Protocol Suite" -...
2013-02-25, rev -03: Implementation of Internet protocols on small devices benefits from light-weight implementation techniques, which are often not documented in an accessible way.
View Article"Minimal IKEv2" - Tero Kivinen
2013-04-11, rev -00: This document describes minimal version of the Internet Key Exchange version 2 (IKEv2) protocol. IKEv2 is a component of IPsec used for performing mutual authentication and...
View Article"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...
2013-07-09, rev -05: The Internet Protocol Suite is increasingly used on small devices with severe constraints, creating constrained node networks. This document provides a number of basic terms that...
View Article"Building Power-Efficient CoAP Devices for Cellular Networks" - Jari Arkko,...
2013-08-14, rev -00: This memo discusses the use of the Constrained Application Protocol (CoAP) protocol in building sensors and other devices that employ cellular networks as a communications medium....
View Article"Guidance for Light-Weight Implementations of the Internet Protocol Suite" -...
2013-02-25, rev -03: Implementation of Internet protocols on small devices benefits from light-weight implementation techniques, which are often not documented in an accessible way.
View Article"Minimal IKEv2" - Tero Kivinen
2013-04-11, rev -00: This document describes minimal version of the Internet Key Exchange version 2 (IKEv2) protocol. IKEv2 is a component of IPsec used for performing mutual authentication and...
View Article"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...
2013-07-09, rev -05: The Internet Protocol Suite is increasingly used on small devices with severe constraints, creating constrained node networks. This document provides a number of basic terms that...
View Article"Building Power-Efficient CoAP Devices for Cellular Networks" - Jari Arkko,...
2013-08-14, rev -00: This memo discusses the use of the Constrained Application Protocol (CoAP) protocol in building sensors and other devices that employ cellular networks as a communications medium....
View Article"Minimal IKEv2" - Tero Kivinen
2013-04-11, rev -00: This document describes minimal version of the Internet Key Exchange version 2 (IKEv2) protocol. IKEv2 is a component of IPsec used for performing mutual authentication and...
View Article"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...
2013-07-09, rev -05: The Internet Protocol Suite is increasingly used on small devices with severe constraints, creating constrained node networks. This document provides a number of basic terms that...
View Article"Building Power-Efficient CoAP Devices for Cellular Networks" - Jari Arkko,...
2013-08-14, rev -00: This memo discusses the use of the Constrained Application Protocol (CoAP) protocol in building sensors and other devices that employ cellular networks as a communications medium....
View Article"A Hitchhiker's Guide to the (Datagram) Transport Layer Security Protocol for...
2013-09-04, rev -00: Transport Layer Security (TLS) is a widely used security protocol that offers communication security services at the transport layer. The initial design of TLS was focused on the...
View Article"Minimal IKEv2" - Tero Kivinen
2013-10-17, rev -01: This document describes minimal version of the Internet Key Exchange version 2 (IKEv2) protocol. IKEv2 is a component of IPsec used for performing mutual authentication and...
View Article"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...
2013-12-18, rev -06: The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory and processing resources, creating constrained node networks. This...
View Article"Terminology for Constrained Node Networks" - Carsten Bormann, Mehmet Ersue,...
2014-02-10, rev -07: The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory and processing resources, creating constrained node networks. This...
View Article"Building Power-Efficient CoAP Devices for Cellular Networks" - Jari Arkko,...
2014-02-13, rev -01: This memo discusses the use of the Constrained Application Protocol (CoAP) protocol in building sensors and other devices that employ cellular networks as a communications medium....
View Article
More Pages to Explore .....