BibTeX records: Alper E. Yegin

download as .bib file

@article{DBLP:journals/rfc/rfc7376,
  author       = {Tirumaleswar Reddy and
                  Ram Mohan Ravindranath and
                  Muthu Arul Mozhi Perumal and
                  Alper E. Yegin},
  title        = {Problems with Session Traversal Utilities for {NAT} {(STUN)} Long-Term
                  Authentication for Traversal Using Relays around {NAT} {(TURN)}},
  journal      = {{RFC}},
  volume       = {7376},
  pages        = {1--8},
  year         = {2014},
  url          = {https://doi.org/10.17487/RFC7376},
  doi          = {10.17487/RFC7376},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc7376.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6610,
  author       = {Heejin Jang and
                  Alper E. Yegin and
                  Kuntal Chowdhury and
                  JinHyeock Choi and
                  Ted Lemon},
  title        = {{DHCP} Options for Home Information Discovery in Mobile IPv6 (MIPv6)},
  journal      = {{RFC}},
  volume       = {6610},
  pages        = {1--16},
  year         = {2012},
  url          = {https://doi.org/10.17487/RFC6610},
  doi          = {10.17487/RFC6610},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc6610.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6611,
  author       = {Kuntal Chowdhury and
                  Alper E. Yegin},
  title        = {Mobile IPv6 (MIPv6) Bootstrapping for the Integrated Scenario},
  journal      = {{RFC}},
  volume       = {6611},
  pages        = {1--12},
  year         = {2012},
  url          = {https://doi.org/10.17487/RFC6611},
  doi          = {10.17487/RFC6611},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc6611.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6786,
  author       = {Alper E. Yegin and
                  Robert Cragie},
  title        = {Encrypting the Protocol for Carrying Authentication for Network Access
                  {(PANA)} Attribute-Value Pairs},
  journal      = {{RFC}},
  volume       = {6786},
  pages        = {1--11},
  year         = {2012},
  url          = {https://doi.org/10.17487/RFC6786},
  doi          = {10.17487/RFC6786},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc6786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6345,
  author       = {Paul Duffy and
                  Samita Chakrabarti and
                  Robert Cragie and
                  Yoshihiro Ohba and
                  Alper E. Yegin},
  title        = {Protocol for Carrying Authentication for Network Access {(PANA)} Relay
                  Element},
  journal      = {{RFC}},
  volume       = {6345},
  pages        = {1--12},
  year         = {2011},
  url          = {https://doi.org/10.17487/RFC6345},
  doi          = {10.17487/RFC6345},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc6345.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5807,
  author       = {Yoshihiro Ohba and
                  Alper E. Yegin},
  title        = {Definition of Master Key between {PANA} Client and Enforcement Point},
  journal      = {{RFC}},
  volume       = {5807},
  pages        = {1--7},
  year         = {2010},
  url          = {https://doi.org/10.17487/RFC5807},
  doi          = {10.17487/RFC5807},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5807.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5872,
  author       = {Jari Arkko and
                  Alper E. Yegin},
  title        = {{IANA} Rules for the Protocol for Carrying Authentication for Network
                  Access {(PANA)}},
  journal      = {{RFC}},
  volume       = {5872},
  pages        = {1--5},
  year         = {2010},
  url          = {https://doi.org/10.17487/RFC5872},
  doi          = {10.17487/RFC5872},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5872.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5873,
  author       = {Yoshihiro Ohba and
                  Alper E. Yegin},
  title        = {Pre-Authentication Support for the Protocol for Carrying Authentication
                  for Network Access {(PANA)}},
  journal      = {{RFC}},
  volume       = {5873},
  pages        = {1--8},
  year         = {2010},
  url          = {https://doi.org/10.17487/RFC5873},
  doi          = {10.17487/RFC5873},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5873.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5191,
  author       = {Dan Forsberg and
                  Yoshihiro Ohba and
                  Basavaraj Patil and
                  Hannes Tschofenig and
                  Alper E. Yegin},
  title        = {Protocol for Carrying Authentication for Network Access {(PANA)}},
  journal      = {{RFC}},
  volume       = {5191},
  pages        = {1--46},
  year         = {2008},
  url          = {https://doi.org/10.17487/RFC5191},
  doi          = {10.17487/RFC5191},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5191.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5192,
  author       = {Lionel Morand and
                  Alper E. Yegin and
                  Suraj Kumar and
                  Syam Madanapalli},
  title        = {{DHCP} Options for Protocol for Carrying Authentication for Network
                  Access {(PANA)} Authentication Agents},
  journal      = {{RFC}},
  volume       = {5192},
  pages        = {1--8},
  year         = {2008},
  url          = {https://doi.org/10.17487/RFC5192},
  doi          = {10.17487/RFC5192},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5192.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5193,
  author       = {Prakash Jayaraman and
                  Rafael Mar{\'{\i}}n L{\'{o}}pez and
                  Yoshihiro Ohba and
                  Mohan Parthasarathy and
                  Alper E. Yegin},
  title        = {Protocol for Carrying Authentication for Network Access {(PANA)} Framework},
  journal      = {{RFC}},
  volume       = {5193},
  pages        = {1--11},
  year         = {2008},
  url          = {https://doi.org/10.17487/RFC5193},
  doi          = {10.17487/RFC5193},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5193.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4957,
  author       = {Suresh Krishnan and
                  Nicolas Montavont and
                  Eric Njedjou and
                  Siva Veerepalli and
                  Alper E. Yegin},
  title        = {Link-Layer Event Notifications for Detecting Network Attachments},
  journal      = {{RFC}},
  volume       = {4957},
  pages        = {1--18},
  year         = {2007},
  url          = {https://doi.org/10.17487/RFC4957},
  doi          = {10.17487/RFC4957},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4957.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4058,
  author       = {Alper E. Yegin and
                  Yoshihiro Ohba and
                  Reinaldo Penno and
                  George Tsirtsis and
                  Cliff Wang},
  title        = {Protocol for Carrying Authentication for Network Access {(PANA)} Requirements},
  journal      = {{RFC}},
  volume       = {4058},
  pages        = {1--19},
  year         = {2005},
  url          = {https://doi.org/10.17487/RFC4058},
  doi          = {10.17487/RFC4058},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4058.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwcn/YokoteYTFWT02,
  author       = {Aki Yokote and
                  Alper E. Yegin and
                  Muhammad Mukarram Bin Tariq and
                  Guangrui Fu and
                  C. Williams and
                  Atsushi Takeshita},
  title        = {Mobile {IP} {API}},
  booktitle    = {Proceedings of The Fourth {IEEE} Conference on Mobile and Wireless
                  Communications Networks, {MWCN} 2002, September 9-11, 2002, Stockholm,
                  Sweden},
  pages        = {480--484},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/MWCN.2002.1045811},
  doi          = {10.1109/MWCN.2002.1045811},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwcn/YokoteYTFWT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics