ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
◽
10.1109/idaacs.2019.8924344
◽
2019
◽
Author(s):
Belqassim Bouteghrine
◽
Mohammed Rabiai
◽
Camel Tanougast
◽
Said Sadoudi
Keyword(s):
Key Exchange
◽
Fpga Implementation
◽
Internet Key Exchange
Download Full-text
Related Documents
Cited By
References
Use of Hash Algorithms in Internet Key Exchange (IKE) and IPsec
10.17487/rfc4894
◽
2007
◽
Author(s):
P. Hoffman
Keyword(s):
Key Exchange
◽
Internet Key Exchange
Download Full-text
An architecture for the Internet Key Exchange Protocol
IBM Systems Journal
◽
10.1147/sj.403.0721
◽
2001
◽
Vol 40
(3)
◽
pp. 721-746
◽
Cited By ~ 12
Author(s):
P.-C. Cheng
Keyword(s):
Key Exchange
◽
The Internet
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
Using Advanced Encryption Standard Counter Mode (AES-CTR) with the Internet Key Exchange version 02 (IKEv2) Protocol
10.17487/rfc5930
◽
2010
◽
Author(s):
S. Shen
◽
Y. Mao
◽
Keyword(s):
Key Exchange
◽
Advanced Encryption Standard
◽
The Internet
◽
Internet Key Exchange
Download Full-text
An Internet Key Exchange Protocol Version 2 (IKEv2) Extension to Support EAP Re-authentication Protocol (ERP)
10.17487/rfc6867
◽
2013
◽
Cited By ~ 1
Author(s):
Y. Nir
◽
Q. Wu
Keyword(s):
Authentication Protocol
◽
Key Exchange
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
The NULL Authentication Method in the Internet Key Exchange Protocol Version 2 (IKEv2)
10.17487/rfc7619
◽
2015
◽
Cited By ~ 1
Author(s):
V. Smyslov
◽
P. Wouters
Keyword(s):
Key Exchange
◽
The Internet
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
Contribution to enhance IPSec security by a safe and efficient internet key exchange protocol
2013 World Congress on Computer and Information Technology (WCCIT)
◽
10.1109/wccit.2013.6618745
◽
2013
◽
Cited By ~ 2
Author(s):
Ahmim Marwa
◽
Babes Malika
◽
Ghoualmi Nacira
Keyword(s):
Key Exchange
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
Denial of Service Attacks Using Internet Key Exchange Protocol
2008 5th IEEE Consumer Communications and Networking Conference
◽
10.1109/ccnc08.2007.111
◽
2008
◽
Cited By ~ 2
Author(s):
Prashant Dewan
◽
Divya Kolar Sunder Naidu
◽
David M. Durham
Keyword(s):
Denial Of Service
◽
Key Exchange
◽
Denial Of Service Attacks
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
Comparative analysis of Internet Key Exchange protocols
2015 International Conference on Information and Communication Technologies (ICICT)
◽
10.1109/icict.2015.7469595
◽
2015
◽
Cited By ~ 1
Author(s):
Safdar Hussain Shaheen
◽
Muhammad Yousaf
◽
Muhammad Younas Majeed
Keyword(s):
Comparative Analysis
◽
Key Exchange
◽
Key Exchange Protocols
◽
Internet Key Exchange
Download Full-text
The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method
10.17487/rfc5106
◽
2008
◽
Cited By ~ 10
Author(s):
H. Tschofenig
◽
D. Kroeselberg
◽
A. Pashalidis
◽
Y. Ohba
◽
F. Bersani
Keyword(s):
Authentication Protocol
◽
Key Exchange
◽
Key Exchange Protocol
◽
Extensible Authentication Protocol
◽
Internet Key Exchange
Download Full-text
Internet key exchange (IKE) based secure wireless and mobile networks
10.31979/etd.dc2q-vh3u
◽
2004
◽
Author(s):
Meenakshi Vohra
Keyword(s):
Mobile Networks
◽
Key Exchange
◽
Internet Key Exchange
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close