default search action
Hannes Tschofenig
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i94]Mingliang Pei, Hannes Tschofenig, Dave Thaler, David Wheeler:
Trusted Execution Environment Provisioning (TEEP) Architecture. RFC 9397: 1-31 (2023) - [i93]Russ Housley, Hannes Tschofenig:
CBOR Object Signing and Encryption (COSE): AES-CTR and AES-CBC. RFC 9459: 1-10 (2023) - 2022
- [i92]Brendan Moran, Hannes Tschofenig, Henk Birkholz:
A Manifest Information Model for Firmware Updates in Internet of Things (IoT) Devices. RFC 9124: 1-40 (2022) - [i91]Eric Rescorla, Hannes Tschofenig, Thomas Fossati, Achim Kraus:
Connection Identifier for DTLS 1.2. RFC 9146: 1-14 (2022) - [i90]Eric Rescorla, Hannes Tschofenig, Nagendra Modadugu:
The Datagram Transport Layer Security (DTLS) Protocol Version 1.3. RFC 9147: 1-61 (2022) - [i89]Ludwig Seitz, Göran Selander, Erik Wahlstroem, Samuel Erdtman, Hannes Tschofenig:
Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth). RFC 9200: 1-72 (2022) - 2021
- [i88]Brendan Moran, Hannes Tschofenig, David Brown, Milosch Meriac:
A Firmware Update Architecture for Internet of Things. RFC 9019: 1-25 (2021) - 2020
- [c17]Gabriele Restuccia, Hannes Tschofenig, Emmanuel Baccelli:
Low-Power IoT Communication Security: On the Performance of DTLS and TLS 1.3. PEMWN 2020: 1-6 - [i87]Gabriele Restuccia, Hannes Tschofenig, Emmanuel Baccelli:
Low-Power IoT Communication Security: On the Performance of DTLS and TLS 1.3. CoRR abs/2011.12035 (2020) - [i86]Brian Campbell, John Bradley, Hannes Tschofenig:
Resource Indicators for OAuth 2.0. RFC 8707: 1-11 (2020) - [i85]Michael B. Jones, Ludwig Seitz, Göran Selander, Samuel Erdtman, Hannes Tschofenig:
Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs). RFC 8747: 1-14 (2020) - [i84]Brian Rosen, Henning Schulzrinne, Hannes Tschofenig, Randall Gellens:
Non-interactive Emergency Calls. RFC 8876: 1-25 (2020)
2010 – 2019
- 2019
- [b2]Hannes Tschofenig:
A Secure and Privacy-Friendly IP-based Emergency Services Architecture. University of Göttingen, Germany, 2019 - [j12]Koen Zandberg, Kaspar Schleiser, Francisco Acosta Padilla, Hannes Tschofenig, Emmanuel Baccelli:
Secure Firmware Updates for Constrained IoT Devices Using Open Standards: A Reality Check. IEEE Access 7: 71907-71920 (2019) - [j11]Hannes Tschofenig, Emmanuel Baccelli:
Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security. IEEE Secur. Priv. 17(5): 47-57 (2019) - [i83]William Denniss, John Bradley, Michael B. Jones, Hannes Tschofenig:
OAuth 2.0 Device Authorization Grant. RFC 8628: 1-21 (2019) - 2018
- [i82]Carsten Bormann, Simon Lemay, Hannes Tschofenig, Klaus Hartke, Bilhanan Silverajan, Brian Raymor:
CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets. RFC 8323: 1-54 (2018) - [i81]Michael B. Jones, Erik Wahlstroem, Samuel Erdtman, Hannes Tschofenig:
CBOR Web Token (CWT). RFC 8392: 1-25 (2018) - [i80]Jaime Jimenez, Hannes Tschofenig, David Thaler:
Report from the Internet of Things (IoT) Semantic Interoperability (IOTSI) Workshop 2016. RFC 8477: 1-18 (2018) - 2017
- [i79]Randall Gellens, Hannes Tschofenig:
Next-Generation Pan-European eCall. RFC 8147: 1-43 (2017) - [i78]Randall Gellens, Brian Rosen, Hannes Tschofenig:
Next-Generation Vehicle-Initiated Emergency Calls. RFC 8148: 1-40 (2017) - [i77]Hannes Tschofenig, Stephen Farrell:
Report from the Internet of Things Software Update (IoTSU) Workshop 2016. RFC 8240: 1-27 (2017) - 2016
- [j10]Hannes Tschofenig:
Fixing User Authentication for the Internet of Things (IoT). Datenschutz und Datensicherheit 40(4): 222-224 (2016) - [i76]Tero Kivinen, Paul Wouters, Hannes Tschofenig:
Generic Raw Public-Key Support for IKEv2. RFC 7670: 1-10 (2016) - [i75]Michael B. Jones, John Bradley, Hannes Tschofenig:
Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs). RFC 7800: 1-15 (2016) - [i74]Josh Howlett, Sam Hartman, Hannes Tschofenig, Jim Schaad:
Application Bridging for Federated Access Beyond Web (ABFAB) Architecture. RFC 7831: 1-46 (2016) - [i73]James Winterbottom, Hannes Tschofenig, Laura Liess:
A Routing Request Extension for the HTTP-Enabled Location Delivery (HELD) Protocol. RFC 7840: 1-16 (2016) - [i72]Randall Gellens, Brian Rosen, Hannes Tschofenig, Roger Marshall, James Winterbottom:
Additional Data Related to an Emergency Call. RFC 7852: 1-113 (2016) - [i71]Stefan Santesson, Hannes Tschofenig:
Transport Layer Security (TLS) Cached Information Extension. RFC 7924: 1-19 (2016) - [i70]Hannes Tschofenig, Thomas Fossati:
Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things. RFC 7925: 1-61 (2016) - [i69]Hannes Tschofenig, Jouni Korhonen, Glen Zorn, Kervin Pillay:
Security at the Attribute-Value Pair (AVP) Level for Non-neighboring Diameter Nodes: Scenarios and Requirements. RFC 7966: 1-11 (2016) - 2015
- [i68]Hannes Tschofenig, Jari Arkko, David Thaler, Danny McPherson:
Architectural Considerations in Smart Object Networking. RFC 7452: 1-24 (2015) - [i67]William J. Mills, Tim Showalter, Hannes Tschofenig:
A Set of Simple Authentication and Security Layer (SASL) Mechanisms for OAuth. RFC 7628: 1-21 (2015) - [i66]Stephen Farrell, Rigo Wenning, Bert Bos, Marc Blanchet, Hannes Tschofenig:
Report from the Strengthening the Internet (STRINT) Workshop. RFC 7687: 1-32 (2015) - 2014
- [j9]Sye Loong Keoh, Sandeep S. Kumar, Hannes Tschofenig:
Securing the Internet of Things: A Standardization Perspective. IEEE Internet Things J. 1(3): 265-275 (2014) - [i65]Henning Schulzrinne, Hannes Tschofenig, Christer Holmberg, Milan Patel:
Public Safety Answering Point (PSAP) Callback. RFC 7090: 1-18 (2014) - [i64]Richard L. Barnes, Martin Thomson, James Winterbottom, Hannes Tschofenig:
Location Configuration Extensions for Policy Management. RFC 7199: 1-20 (2014) - [i63]Paul Wouters, Hannes Tschofenig, John Gilmore, Samuel Weiler, Tero Kivinen:
Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). RFC 7250: 1-18 (2014) - [i62]Stephen Farrell, Hannes Tschofenig:
Pervasive Monitoring Is an Attack. RFC 7258: 1-6 (2014) - [i61]Hannes Tschofenig, Lars Eggert, Zaheduzzaman Sarker:
Report from the IAB/IRTF Workshop on Congestion Control for Interactive Real-Time Communication. RFC 7295: 1-26 (2014) - [i60]Jon Peterson, Henning Schulzrinne, Hannes Tschofenig:
Secure Telephone Identity Problem Statement and Requirements. RFC 7340: 1-25 (2014) - [i59]Hannes Tschofenig, Henning Schulzrinne, Bernard Aboba:
Trustworthy Location. RFC 7378: 1-31 (2014) - [i58]Johannes Gilger, Hannes Tschofenig:
Report from the Smart Object Security Workshop. RFC 7397: 1-23 (2014) - [i57]Henning Schulzrinne, Stephen McCann, Gabor Bajko, Hannes Tschofenig, Dirk Kröselberg:
Extensions to the Emergency Services Architecture for Dealing With Unauthenticated and Unauthorized Devices. RFC 7406: 1-25 (2014) - [i56]Lionel Morand, Victor Fajardo, Hannes Tschofenig:
Diameter Applications Design Guidelines. RFC 7423: 1-29 (2014) - 2013
- [b1]Hannes Tschofenig, Henning Schulzrinne:
Internet Protocol-based Emergency Services. Wiley 2013, ISBN 978-0-470-68976-9 - [c16]Lei Jiao, Roy Friedman, Xiaoming Fu, Stefano Secci, Zbigniew Smoreda, Hannes Tschofenig:
Cloud-based computation offloading for mobile devices: State of the art, challenges and opportunities. Future Network & Mobile Summit 2013: 1-11 - [i55]Henning Schulzrinne, Hannes Tschofenig, Jorge Ricardo Cuellar, James M. Polk, John B. Morris, Martin Thomson:
Geolocation Policy: A Document Format for Expressing Privacy Preferences for Location Information. RFC 6772: 1-44 (2013) - [i54]Jon Peterson, Olaf M. Kolkman, Hannes Tschofenig, Bernard Aboba:
Architectural Considerations on Application Features in the DNS. RFC 6950: 1-31 (2013) - [i53]Alissa Cooper, Hannes Tschofenig, Bernard Aboba, Jon Peterson, John B. Morris, Marit Hansen, Rhys Smith:
Privacy Considerations for Internet Protocols. RFC 6973: 1-36 (2013) - 2012
- [i52]Henning Schulzrinne, Laura Liess, Hannes Tschofenig, Barbara Stark, Andres Kuett:
Location Hiding: Problem Statement and Requirements. RFC 6444: 1-9 (2012) - [i51]Rohan Mahy, Brian Rosen, Hannes Tschofenig:
Filtering Location Notifications in the Session Initiation Protocol (SIP). RFC 6447: 1-19 (2012) - [i50]Hannes Tschofenig, Jari Arkko:
Report from the Smart Object Workshop. RFC 6574: 1-32 (2012) - [i49]Eliot Lear, Hannes Tschofenig, Henry Mauldin, Simon Josefsson:
A Simple Authentication and Security Layer (SASL) and Generic Security Service Application Program Interface (GSS-API) Mechanism for OpenID. RFC 6616: 1-18 (2012) - [i48]Jouni Korhonen, Basavaraj Patil, Hannes Tschofenig, Dirk Kröselberg:
Mobile IPv6 Security Framework Using Transport Layer Security for Communication between the Mobile Node and Home Agent. RFC 6618: 1-38 (2012) - [i47]Henning Schulzrinne, Hannes Tschofenig:
Synchronizing Service Boundaries and Elements Based on the Location-to-Service Translation (LoST) Protocol. RFC 6739: 1-25 (2012) - [i46]James Winterbottom, Hannes Tschofenig, Henning Schulzrinne, Martin Thomson:
A Location Dereference Protocol Using HTTP-Enabled Location Delivery (HELD). RFC 6753: 1-25 (2012) - [i45]Brian Campbell, Hannes Tschofenig:
An IETF URN Sub-Namespace for OAuth. RFC 6755: 1-5 (2012) - 2011
- [j8]Hannes Tschofenig:
Security risks in next-generation emergency services. Commun. ACM 54(11): 23-25 (2011) - [c15]Theodore B. Zahariadis, Dimitri Papadimitriou, Hannes Tschofenig, Stephan Haller, Petros Daras, George D. Stamoulis, Manfred Hauswirth:
Towards a Future Internet Architecture. Future Internet Assembly 2011: 7-18 - [i44]Takako Sanda, Xiaoming Fu, Seong-Ho Jeong, Jukka Manner, Hannes Tschofenig:
NSIS Protocol Operation in Mobile Environments. RFC 5980: 1-32 (2011) - [i43]Jukka Manner, Martin Stiemerling, Hannes Tschofenig, Roland Bless:
Authorization for NSIS Signaling Layer Protocols. RFC 5981: 1-37 (2011) - [i42]Yaron Sheffer, Glen Zorn, Hannes Tschofenig, Scott R. Fluhrer:
An EAP Authentication Method Based on the Encrypted Key Exchange (EKE) Protocol. RFC 6124: 1-33 (2011) - [i41]James Winterbottom, Martin Thomson, Hannes Tschofenig, Richard L. Barnes:
Use of Device Identity in HTTP-Enabled Location Delivery (HELD). RFC 6155: 1-27 (2011) - [i40]Richard L. Barnes, Matt Lepinski, Alissa Cooper, John B. Morris, Hannes Tschofenig, Henning Schulzrinne:
An Architecture for Location and Location Privacy in Internet Applications. RFC 6280: 1-41 (2011) - 2010
- [j7]Hannes Tschofenig, Mayutan Arumaithurai, Henning Schulzrinne, Bernard Aboba:
How secure is the next generation of IP-based emergency services architecture? Int. J. Crit. Infrastructure Prot. 3(1): 41-50 (2010) - [i39]Hannes Tschofenig, Henning Schulzrinne:
GEOPRIV Layer 7 Location Configuration Protocol: Problem Statement and Requirements. RFC 5687: 1-21 (2010) - [i38]Hassnaa Moustafa, Hannes Tschofenig, Stefaan De Cnodder:
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP). RFC 5713: 1-18 (2010) - [i37]Dan Romascanu, Hannes Tschofenig:
Updated IANA Considerations for Diameter Command Code Allocations. RFC 5719: 1-5 (2010) - [i36]Yaron Sheffer, Hannes Tschofenig:
Internet Key Exchange Protocol Version 2 (IKEv2) Session Resumption. RFC 5723: 1-26 (2010) - [i35]Jason Fischl, Hannes Tschofenig, Eric Rescorla:
Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS). RFC 5763: 1-37 (2010) - [i34]Miika Komu, Thomas R. Henderson, Hannes Tschofenig, Jan Melén, Ari Keränen:
Basic Host Identity Protocol (HIP) Extensions for Traversal of Network Address Translators. RFC 5770: 1-34 (2010) - [i33]Jouni Korhonen, Hannes Tschofenig, Mayutan Arumaithurai, Mark Jones, Avi Lior:
Traffic Classification and Quality of Service (QoS) Attributes for Diameter. RFC 5777: 1-43 (2010) - [i32]Jouni Korhonen, Hannes Tschofenig, Julien Bournelle, Gerardo Giaretta, Madjid Nakhjiri:
Diameter Mobile IPv6: Support for Home Agent to Diameter Server Interaction. RFC 5778: 1-34 (2010) - [i31]Dong Sun, Peter J. McCann, Hannes Tschofenig, Tina Tsou, Avri Doria, Glen Zorn:
Diameter Quality-of-Service Application. RFC 5866: 1-51 (2010) - [i30]Henning Schulzrinne, Vishal Kumar Singh, Hannes Tschofenig, Martin Thomson:
Dynamic Extensions to the Presence Information Data Format Location Object (PIDF-LO). RFC 5962: 1-11 (2010) - [i29]Tseno Tsenov, Hannes Tschofenig, Xiaoming Fu, Cedric Aoun, Elwyn B. Davies:
General Internet Signaling Transport (GIST) State Machine. RFC 5972: 1-27 (2010) - [i28]Martin Stiemerling, Hannes Tschofenig, Cedric Aoun, Elwyn B. Davies:
NAT/Firewall NSIS Signaling Layer Protocol (NSLP). RFC 5973: 1-90 (2010) - [i27]Pasi Eronen, Hannes Tschofenig, Yaron Sheffer:
An Extension for EAP-Only Authentication in IKEv2. RFC 5998: 1-16 (2010) - [i26]Yoav Nir, Hannes Tschofenig, Hui Deng, Rajeshwar Singh:
A Childless Initiation of the Internet Key Exchange Version 2 (IKEv2) Security Association (SA). RFC 6023: 1-7 (2010)
2000 – 2009
- 2009
- [j6]Xiaoming Fu, Henning Schulzrinne, Hannes Tschofenig, Christian Dickmann, Dieter Hogrefe:
Overhead and performance study of the general internet signaling transport (GIST) protocol. IEEE/ACM Trans. Netw. 17(1): 158-171 (2009) - [i25]T. Charles Clancy, Hannes Tschofenig:
Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method. RFC 5433: 1-38 (2009) - [i24]Jouni Korhonen, Julien Bournelle, Hannes Tschofenig, Charles E. Perkins, Kuntal Chowdhury:
Diameter Mobile IPv6: Support for Network Access Server to Diameter Server Interaction. RFC 5447: 1-17 (2009) - [i23]Dan Wing, Steffen Fries, Hannes Tschofenig, François Audet:
Requirements and Analysis of Media Security Management Protocols. RFC 5479: 1-45 (2009) - [i22]James Winterbottom, Martin Thomson, Hannes Tschofenig:
GEOPRIV Presence Information Data Format Location Object (PIDF-LO) Usage Clarification, Considerations, and Recommendations. RFC 5491: 1-28 (2009) - [i21]Hannes Tschofenig, Farid Adrangi, Mark Jones, Avi Lior, Bernard Aboba:
Carrying Location Objects in RADIUS and Diameter. RFC 5580: 1-53 (2009) - [i20]Jouni Korhonen, Hannes Tschofenig, Elwyn B. Davies:
Quality of Service Parameters for Usage with Diameter. RFC 5624: 1-12 (2009) - 2008
- [c14]Mayutan Arumaithurai, Xiaoming Fu, Bernd Schloer, Hannes Tschofenig:
Performance Study of the NSIS QoS-NSLP Protocol. GLOBECOM 2008: 2531-2536 - [i19]Tom Taylor, Hannes Tschofenig, Henning Schulzrinne, Murugaraj Shanmugam:
Security Threats and Requirements for Emergency Call Marking and Mapping. RFC 5069: 1-12 (2008) - [i18]Joseph Salowey, Hao Zhou, Pasi Eronen, Hannes Tschofenig:
Transport Layer Security (TLS) Session Resumption without Server-Side State. RFC 5077: 1-20 (2008) - [i17]Hannes Tschofenig, Dirk Kröselberg, Andreas Pashalidis, Yoshihiro Ohba, Florent Bersani:
The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method. RFC 5106: 1-33 (2008) - [i16]Dan Forsberg, Yoshihiro Ohba, Basavaraj Patil, Hannes Tschofenig, Alper E. Yegin:
Protocol for Carrying Authentication for Network Access (PANA). RFC 5191: 1-46 (2008) - [i15]Ted Hardie, Andrew Newton, Henning Schulzrinne, Hannes Tschofenig:
LoST: A Location-to-Service Translation Protocol. RFC 5222: 1-69 (2008) - [i14]Henning Schulzrinne, James M. Polk, Hannes Tschofenig:
Discovering Location-to-Service Translation (LoST) Servers Using the Dynamic Host Configuration Protocol (DHCP). RFC 5223: 1-8 (2008) - 2007
- [j5]Jason Fischl, Hannes Tschofenig:
Making SIP make cents. ACM Queue 5(2): 42-49 (2007) - [c13]Henning Schulzrinne, Hannes Tschofenig, Andrew Newton, Ted Hardie:
LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering Points. IPCCC 2007: 606-611 - [c12]Hannes Tschofenig, Henning Schulzrinne, Murugaraj Shanmugam, Andrew Newton:
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture. IPCCC 2007: 626-631 - [c11]Niklas Steinleitner, Xiaoming Fu, Dieter Hogrefe, Thomas Schreck, Hannes Tschofenig:
An NSIS-based approach for firewall traversal in mobile IPv6 networks. WICON 2007: 15 - [i13]Henning Schulzrinne, Hannes Tschofenig, John B. Morris, Jorge Ricardo Cuellar, James M. Polk, Jonathan D. Rosenberg:
Common Policy: A Document Format for Expressing Privacy Preferences. RFC 4745: 1-32 (2007) - [i12]Florent Bersani, Hannes Tschofenig:
The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method. RFC 4764: 1-64 (2007) - [i11]Michael Myers, Hannes Tschofenig:
Online Certificate Status Protocol (OCSP) Extensions to IKEv2. RFC 4806: 1-11 (2007) - [i10]Richard Graveman, Mohan Parthasarathy, Pekka Savola, Hannes Tschofenig:
Using IPsec to Secure IPv6-in-IPv4 Tunnels. RFC 4891: 1-23 (2007) - 2006
- [j4]Xiaoming Fu, Hannes Tschofenig, Dieter Hogrefe:
Beyond QoS signaling: A new generic IP signaling framework. Comput. Networks 50(17): 3416-3433 (2006) - [j3]Hannes Tschofenig, Xiaoming Fu:
Securing the Next Steps In Signalling (NSIS) protocol suite. Int. J. Internet Protoc. Technol. 1(4): 271-282 (2006) - [j2]Hannes Tschofenig, Rainer Falk, Jon Peterson, Jeff Hodges, Douglas C. Sicker, James M. Polk:
Using SAML to protect the session initiation protocol (SIP). IEEE Netw. 20(5): 14-17 (2006) - [c10]Xiaoming Fu, Henning Schulzrinne, Hannes Tschofenig, Christian Dickmann, Dieter Hogrefe:
Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol. INFOCOM 2006 - [c9]Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xiaoming Fu:
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security. INFOCOM 2006 - [c8]Seppo Heikkinen, Hannes Tschofenig:
HIP based Approach for Configuration Provisioning. PIMRC 2006: 1-5 - [i9]Steffen Fries, Hannes Tschofenig:
Bootstrapping Timed Efficient Stream Loss-Tolerant Authentication (TESLA). RFC 4442: 1-18 (2006) - [i8]Jon Peterson, James M. Polk, Douglas C. Sicker, Hannes Tschofenig:
Trait-Based Authorization Requirements for the Session Initiation Protocol (SIP). RFC 4484: 1-15 (2006) - [i7]Franck Le, Stefano M. Faccin, Basavaraj Patil, Hannes Tschofenig:
Mobile IPv6 and Firewalls: Problem Statement. RFC 4487: 1-16 (2006) - [i6]Joseph Salowey, Hao Zhou, Pasi Eronen, Hannes Tschofenig:
Transport Layer Security (TLS) Session Resumption without Server-Side State. RFC 4507: 1-17 (2006) - [i5]Henning Schulzrinne, Hannes Tschofenig:
Location Types Registry. RFC 4589: 1-12 (2006) - [i4]Tero Kivinen, Hannes Tschofenig:
Design of the IKEv2 Mobility and Multihoming (MOBIKE) Protocol. RFC 4621: 1-30 (2006) - 2005
- [j1]Xiaoming Fu, Henning Schulzrinne, Attila Báder, Dieter Hogrefe, Cornelia Kappler, Georgios Karagiannis, Hannes Tschofenig, Sven Van den Bosch:
NSIS: a new extensible IP signaling protocol suite. IEEE Commun. Mag. 43(10): 133-141 (2005) - [c7]Hannes Tschofenig, Andrei V. Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam:
Traversing Middleboxes with the Host Identity Protocol. ACISP 2005: 17-28 - [c6]Tseno Tsenov, Hannes Tschofenig:
Quality of Service Authentication, Authorization and Accounting. IWQoS 2005: 343-345 - [c5]Raffaele Giaffreda, Hannes Tschofenig, Theo Kanter, Christoph Reichert:
An Authorisation and Privacy Framework for Context-Aware Networks. MATA 2005: 149-160 - [c4]Attila Báder, Georgios Karagiannis, Lars Westberg, Cornelia Kappler, Tom Phelan, Hannes Tschofenig, Geert J. Heijenk:
QoS Signaling Across Heterogeneous Wired/Wireless Networks: Resource Management in Diffserv Using the NSIS Protocol Suite. QSHINE 2005: 51 - [c3]Jukka Ylitalo, Patrik Salmela, Hannes Tschofenig:
SPINAT: Integrating IPsec into Overlay Routing. SecureComm 2005: 315-326 - [c2]Xiaoyuan Gu, Xiaoming Fu, Hannes Tschofenig, Lars C. Wolf:
Towards Self-optimizing Protocol Stack for Autonomic Communication: Initial Experience. WAC 2005: 186-201 - [i3]Hannes Tschofenig, Dirk Kröselberg:
Security Threats for Next Steps in Signaling (NSIS). RFC 4081: 1-28 (2005) - [i2]Hannes Tschofenig, Richard Graveman:
RSVP Security Properties. RFC 4230: 1-48 (2005) - [i1]Pasi Eronen, Hannes Tschofenig:
Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). RFC 4279: 1-15 (2005) - 2004
- [c1]Julien Bournelle, Maryline Laurent-Maknavicius, Hannes Tschofenig, Yacine El Mghazli:
Handover-Aware Access Control Mechanism: CTP for PANA. ECUMN 2004: 430-439
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-29 00:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint