Back to Results
First PageMeta Content
Cryptographic protocols / Message authentication codes / Hashing / Internet protocols / HMAC / SHA-2 / Cryptographic hash function / Authentication / Label Distribution Protocol / Cryptography / Computing / Network architecture


Internet Engineering Task Force (IETF) Request for Comments: 7349 Category: Standards Track ISSN: [removed]L. Zheng
Add to Reading List

Document Date: 2014-08-14 14:33:49


Open Document

File Size: 22,45 KB

Share Result on Facebook

Company

LDP SA. / IETF Trust / Internet Engineering Steering Group / Huawei Technologies / /

Event

FDA Phase / /

Facility

National Institute of Standards and Technology / /

IndustryTerm

valid algorithms / default authentication algorithm / Internet Standards / network operator / hash algorithm / network management / cryptographic algorithm / authentication algorithm / Internet Standards Track document / changing keys while maintaining protocol / multicast / /

OperatingSystem

BSD / /

Organization

National Institute of Standards and Technology / NIST SHS / Internet Engineering Task Force / LDP Security Association / stop using this LDP Security Association / /

Position

network manager / trustee / /

Product

Cryptographic Authentication TLV / Hashed Message Authentication Code / SHA-256 / RFC5036 / /

ProgrammingLanguage

L / /

Technology

IPv6 / 10 10 11 12 13 13 13 13 14 Introduction The Label Distribution Protocol / hash algorithm / authentication algorithm / receiving router / IPv4 / specific hashing algorithm / secret key / UDP / following algorithms / default authentication algorithm / currently valid algorithms / Cryptographic Authentication algorithm / key management protocol / cryptographic algorithm / sent using UDP / /

URL

http /

SocialTag