Agenda submitted as PDF
Slides
Agenda, Goals, and Ground Rules
Constraints on Automated Key Management for Routing Protocols
Routing Threats and Key Management
Key Management
Issues with Existing Cryptographic Protection Methods for Routing Protocols
Minutes