ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method
Mapping Intimacies
◽
10.17487/rfc5106
◽
2008
◽
Cited By ~ 10
Author(s):
H. Tschofenig
◽
D. Kroeselberg
◽
A. Pashalidis
◽
Y. Ohba
◽
F. Bersani
Keyword(s):
Authentication Protocol
◽
Key Exchange
◽
Key Exchange Protocol
◽
Extensible Authentication Protocol
◽
Internet Key Exchange
Download Full-text
Related Documents
Cited By
References
An Internet Key Exchange Protocol Version 2 (IKEv2) Extension to Support EAP Re-authentication Protocol (ERP)
10.17487/rfc6867
◽
2013
◽
Cited By ~ 1
Author(s):
Y. Nir
◽
Q. Wu
Keyword(s):
Authentication Protocol
◽
Key Exchange
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
An architecture for the Internet Key Exchange Protocol
IBM Systems Journal
◽
10.1147/sj.403.0721
◽
2001
◽
Vol 40
(3)
◽
pp. 721-746
◽
Cited By ~ 12
Author(s):
P.-C. Cheng
Keyword(s):
Key Exchange
◽
The Internet
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
The NULL Authentication Method in the Internet Key Exchange Protocol Version 2 (IKEv2)
10.17487/rfc7619
◽
2015
◽
Cited By ~ 1
Author(s):
V. Smyslov
◽
P. Wouters
Keyword(s):
Key Exchange
◽
The Internet
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
Contribution to enhance IPSec security by a safe and efficient internet key exchange protocol
2013 World Congress on Computer and Information Technology (WCCIT)
◽
10.1109/wccit.2013.6618745
◽
2013
◽
Cited By ~ 2
Author(s):
Ahmim Marwa
◽
Babes Malika
◽
Ghoualmi Nacira
Keyword(s):
Key Exchange
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
Denial of Service Attacks Using Internet Key Exchange Protocol
2008 5th IEEE Consumer Communications and Networking Conference
◽
10.1109/ccnc08.2007.111
◽
2008
◽
Cited By ~ 2
Author(s):
Prashant Dewan
◽
Divya Kolar Sunder Naidu
◽
David M. Durham
Keyword(s):
Denial Of Service
◽
Key Exchange
◽
Denial Of Service Attacks
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
Media Description for the Internet Key Exchange Protocol (IKE) in the Session Description Protocol (SDP)
10.17487/rfc6193
◽
2011
◽
Author(s):
M. Saito
◽
D. Wing
◽
M. Toyama
Keyword(s):
Key Exchange
◽
The Internet
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
IPv6 Configuration in Internet Key Exchange Protocol Version 2 (IKEv2)
10.17487/rfc5739
◽
2010
◽
Cited By ~ 1
Author(s):
P. Eronen
◽
J. Laganier
◽
C. Madson
Keyword(s):
Key Exchange
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
Asymmetric disribution of computations in Internet Key Exchange Protocol
2008 Canadian Conference on Electrical and Computer Engineering
◽
10.1109/ccece.2008.4564795
◽
2008
◽
Author(s):
Mohammad Mehdi Karbasioun
◽
Mehdi Berenjkub
◽
Bahareh Taji
Keyword(s):
Key Exchange
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
Internet Key Exchange Protocol Version 2 (IKEv2) Notification Status Types for IPv4/IPv6 Coexistence
10.17487/rfc8983
◽
2021
◽
Author(s):
M. Boucadair
Keyword(s):
Key Exchange
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
An internet key exchange protocol based on public key infrastructure
Journal of Shanghai University (English Edition)
◽
10.1007/s11741-004-0012-8
◽
2004
◽
Vol 8
(1)
◽
pp. 51-56
◽
Cited By ~ 1
Author(s):
Jian-ming Zhu
◽
Jian-feng Ma
Keyword(s):
Public Key Infrastructure
◽
Key Exchange
◽
Public Key
◽
Key Exchange Protocol
◽
Internet Key Exchange
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close