11.07.2015 Views

ก F ก ก - bls machine

ก F ก ก - bls machine

ก F ก ก - bls machine

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

D. Eastlake 3rd. December 2005. (Format: TXT=17991 bytes) (ObsoletesRFC2402, RFC2406) (Obsoleted by RFC4835) (Status: PROPOSED STANDARD)4306 Internet Key Exchange (IKEv2) Protocol. C. Kaufman, Ed.. December2005. (Format: TXT=250941 bytes) (Obsoletes RFC2407, RFC2408,RFC2409) (Updated by RFC5282) (Status: PROPOSED STANDARD)4307 Cryptographic Algorithms for Use in the Internet Key ExchangeVersion 2 (IKEv2). J. Schiller. December 2005. (Format: TXT=12985bytes) (Status: PROPOSED STANDARD)4308 Cryptographic Suites for IPsec. P. Hoffman. December 2005.(Format: TXT=13127 bytes) (Status: PROPOSED STANDARD)4309 Using Advanced Encryption Standard (AES) CCM Mode with IPsecEncapsulating Security Payload (ESP). R. Housley. December 2005.(Format: TXT=28998 bytes) (Status: PROPOSED STANDARD)4310 Domain Name System (DNS) Security Extensions Mapping for theExtensible Provisioning Protocol (EPP). S. Hollenbeck. December 2005.(Format: TXT=46326 bytes) (Status: PROPOSED STANDARD)4311 IPv6 Host-to-Router Load Sharing. R. Hinden, D. Thaler. November2005. (Format: TXT=10156 bytes) (Updates RFC2461) (Status: PROPOSEDSTANDARD)4312 The Camellia Cipher Algorithm and Its Use With IPsec. A. Kato, S.Moriai, M. Kanda. December 2005. (Format: TXT=15980 bytes) (Status:PROPOSED STANDARD)4313 Requirements for Distributed Control of Automatic SpeechRecognition (ASR), Speaker Identification/Speaker Verification

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!