This paper is relevant to the discussion :

http://www.iiss.oeaw.ac.at/files/pub/2010-ISPCS-Securing-IEEE1588-by-IPsec_tunnels-An-Analysis.pdf

I remember another paper, but can't find it right now.

Y(J)S


_______________________________________________
TICTOC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tictoc

Reply via email to