Protocol for Carrying Authentication and Network Access (PANA) Threat Analysis and Security Requirements. Parthasarathy, M. Technical Report 4016, IETF, March, 2005. Paper bibtex @techreport{RFC4016,
title = {{Protocol for Carrying Authentication and Network Access (PANA) Threat Analysis and Security Requirements}},
author = {Parthasarathy, M.},
type = {RFC},
number = {4016},
institution = {IETF},
month = mar,
year = 2005,
url = {http://tools.ietf.org/rfc/rfc4016.txt},
}
Downloads: 0
{"_id":"aK8JpgAkPHiLeHkba","bibbaseid":"parthasarathy-protocolforcarryingauthenticationandnetworkaccesspanathreatanalysisandsecurityrequirements-2005","author_short":["Parthasarathy, M."],"bibdata":{"bibtype":"techreport","type":"RFC","title":"Protocol for Carrying Authentication and Network Access (PANA) Threat Analysis and Security Requirements","author":[{"propositions":[],"lastnames":["Parthasarathy"],"firstnames":["M."],"suffixes":[]}],"number":"4016","institution":"IETF","month":"March","year":"2005","url":"http://tools.ietf.org/rfc/rfc4016.txt","bibtex":"@techreport{RFC4016,\n title = {{Protocol for Carrying Authentication and Network Access (PANA) Threat Analysis and Security Requirements}},\n author = {Parthasarathy, M.},\n type = {RFC},\n number = {4016},\n institution = {IETF},\n month = mar,\n year = 2005,\n url = {http://tools.ietf.org/rfc/rfc4016.txt},\n}\n\n","author_short":["Parthasarathy, M."],"key":"RFC4016","id":"RFC4016","bibbaseid":"parthasarathy-protocolforcarryingauthenticationandnetworkaccesspanathreatanalysisandsecurityrequirements-2005","role":"author","urls":{"Paper":"http://tools.ietf.org/rfc/rfc4016.txt"},"metadata":{"authorlinks":{}},"html":""},"bibtype":"techreport","biburl":"https://raw.github.com/hupili/rfc.bib/master/rfc.bib","dataSources":["QXhRq9CSEi44amsga"],"keywords":[],"search_terms":["protocol","carrying","authentication","network","access","pana","threat","analysis","security","requirements","parthasarathy"],"title":"Protocol for Carrying Authentication and Network Access (PANA) Threat Analysis and Security Requirements","year":2005}