skip to main content
RFC2409: The Internet Key Exchange (IKE)1998 RFC
Bibliometrics
Skip Abstract Section
Abstract

ISAKMP ([MSST98]) provides a framework for authentication and key exchange but does not define them. ISAKMP is designed to be key exchange independant; that is, it is designed to support many different key exchanges.

RFC Downloads

Cited By

  1. Guo J, Zhao D, Gu C, Chen X, Zhang X and Ju M (2024). An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations, Journal of Cloud Computing: Advances, Systems and Applications, 13:1, Online publication date: 30-Jan-2024.
  2. Langer M and Bermbach R (2022). NTS4PTP — A comprehensive key management solution for PTP networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 213:C, Online publication date: 4-Aug-2022.
  3. ACM
    Sun S (2021). A Chosen Random Value Attack on WPA3 SAE Authentication Protocol, Digital Threats: Research and Practice, 3:2, (1-8), Online publication date: 30-Jun-2022.
  4. ACM
    Gazdag S, Grundner-Culemann S, Guggemos T, Heider T and Loebenberger D A formal analysis of IKEv2’s post-quantum extension Proceedings of the 37th Annual Computer Security Applications Conference, (91-105)
  5. Chow M and Ma M (2022). A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks, Computers and Electrical Engineering, 95:C, Online publication date: 1-Oct-2021.
  6. ACM
    Adrian D, Bhargavan K, Durumeric Z, Gaudry P, Green M, Halderman J, Heninger N, Springall D, Thomé E, Valenta L, VanderSloot B, Wustrow E, Zanella-Béguelin S and Zimmermann P (2018). Imperfect forward secrecy, Communications of the ACM, 62:1, (106-114), Online publication date: 19-Dec-2018.
  7. Krzywiecki Ł, Kluczniak K, Kozieł P and Panwar N (2018). Privacy-oriented dependency via deniable SIGMA protocol, Computers and Security, 79:C, (53-67), Online publication date: 1-Nov-2018.
  8. ACM
    Checkoway S, Maskiewicz J, Garman C, Fried J, Cohney S, Green M, Heninger N, Weinmann R, Rescorla E and Shacham H (2018). Where did I leave my keys?, Communications of the ACM, 61:11, (148-155), Online publication date: 26-Oct-2018.
  9. ACM
    Cohney S, Green M and Heninger N Practical State Recovery Attacks against Legacy RNG Implementations Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (265-280)
  10. ACM
    Alboghdady S, Winter S, Taha A, Zhang H and Suri N C'mon Proceedings of the 12th International Conference on Availability, Reliability and Security, (1-6)
  11. Lee D and Kim K (2017). Improved Authentication of Binding Update Protocol in Mobile IPv6 Networks, Wireless Personal Communications: An International Journal, 94:3, (351-367), Online publication date: 1-Jun-2017.
  12. ACM
    Chung T, Liu Y, Choffnes D, Levin D, Maggs B, Mislove A and Wilson C Measuring and Applying Invalid SSL Certificates Proceedings of the 2016 Internet Measurement Conference, (527-541)
  13. ACM
    Checkoway S, Maskiewicz J, Garman C, Fried J, Cohney S, Green M, Heninger N, Weinmann R, Rescorla E and Shacham H A Systematic Analysis of the Juniper Dual EC Incident Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (468-479)
  14. ACM
    Michalevsky Y, Nath S and Liu J MASHaBLE Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, (387-400)
  15. Liyanage M, Kumar P, Ylianttila M and Gurtov A (2016). Novel secure VPN architectures for LTE backhaul networks, Security and Communication Networks, 9:10, (1198-1215), Online publication date: 10-Jul-2016.
  16. Coron J Security Analysis of the Modular Enhanced Symmetric Role Authentication mERA Protocol LNCS Essays on The New Codebreakers - Volume 9100, (518-542)
  17. ACM
    Adrian D, Bhargavan K, Durumeric Z, Gaudry P, Green M, Halderman J, Heninger N, Springall D, Thomé E, Valenta L, VanderSloot B, Wustrow E, Zanella-Béguelin S and Zimmermann P Imperfect Forward Secrecy Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (5-17)
  18. Nguyen B and Sprenger C Abstractions for Security Protocol Verification Proceedings of the 4th International Conference on Principles of Security and Trust - Volume 9036, (196-215)
  19. ACM
    Naylor D, Mukerjee M and Steenkiste P (2014). Balancing accountability and privacy in the network, ACM SIGCOMM Computer Communication Review, 44:4, (75-86), Online publication date: 25-Feb-2015.
  20. ACM
    Naylor D, Mukerjee M and Steenkiste P Balancing accountability and privacy in the network Proceedings of the 2014 ACM conference on SIGCOMM, (75-86)
  21. ACM
    Yao A and Zhao Y OAKE Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (1113-1128)
  22. ACM
    Tsankov P, Dashti M and Basin D Semi-valid input coverage for fuzz testing Proceedings of the 2013 International Symposium on Software Testing and Analysis, (56-66)
  23. Tsankov P, Dashti M and Basin D SecFuzz Proceedings of the 7th International Workshop on Automation of Software Test, (1-7)
  24. El Kalam A, Maachaoui M, Idboufker N, Lahcen H and Ouahman A (2012). A Secure Architecture for Nomadic User in IMS Network, International Journal of Mobile Computing and Multimedia Communications, 4:1, (1-17), Online publication date: 1-Jan-2012.
  25. Kuppusamy L, Rangasamy J, Stebila D, Boyd C and Gonzalez Nieto J Towards a provably secure dos-resilient key exchange protocol with perfect forward secrecy Proceedings of the 12th international conference on Cryptology in India, (379-398)
  26. Yue Q, Liu F and Xue R Some improvements to the cost-based framework for analyzing denial of service attacks Proceedings of the Third international conference on Trusted Systems, (84-101)
  27. Cremers C Key exchange in IPsec revisited Proceedings of the 16th European conference on Research in computer security, (315-334)
  28. Mödersheim S Diffie-Hellman without difficulty Proceedings of the 8th international conference on Formal Aspects of Security and Trust, (214-229)
  29. Yang G, Duan S, Wong D, Tan C and Wang H Authenticated key exchange under bad randomness Proceedings of the 15th international conference on Financial Cryptography and Data Security, (113-126)
  30. Szałachowski P and Kotulski Z (2011). Secure time information in the internet key exchange protocol, Annales UMCS, Informatica, 11:3, (41-56), Online publication date: 1-Jan-2011.
  31. Walker J and Li J Key exchange with anonymous authentication using DAA-SIGMA protocol Proceedings of the Second international conference on Trusted Systems, (108-127)
  32. Sasse R, Escobar S, Meadows C and Meseguer J Protocol analysis modulo combination of theories Proceedings of the 6th international conference on Security and trust management, (163-178)
  33. ACM
    Rubino R An open system for transparent firewall authentication and user traffic identification within corporate intranets Proceedings of the 9th ACM SIGITE conference on Information technology education, (113-118)
  34. ACM
    Lu N, Zhou H and Qin Y A comparison study of IKE protocols Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-5)
  35. ACM
    Allard F, Combes J, Bonnin J and Bournelle J IKE context transfer in an IPv6 mobility environment Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture, (55-60)
  36. Mehdizadeh A, Khatun S, Abdullah R, Ali B and Kurup G Experimental test-bed on security enhancement of Route Optimization in mobile IPv6 wireless networks Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks, (22-27)
  37. ACM
    Miltchev S, Smith J, Prevelakis V, Keromytis A and Ioannidis S (2008). Decentralized access control in distributed file systems, ACM Computing Surveys, 40:3, (1-30), Online publication date: 1-Aug-2008.
  38. Menezes A and Ustaoglu B Comparing the Pre- and Post-specified Peer Models for Key Agreement Proceedings of the 13th Australasian conference on Information Security and Privacy, (53-68)
  39. ACM
    Srivatsa M, Iyengar A, Yin J and Liu L (2008). Mitigating application-level denial of service attacks on Web servers, ACM Transactions on the Web, 2:3, (1-49), Online publication date: 1-Jul-2008.
  40. ACM
    Sharp R, Madhavapeddy A, Want R and Pering T Enhancing web browsing security on public terminals using mobile composition Proceedings of the 6th international conference on Mobile systems, applications, and services, (94-105)
  41. Mendez A, Ruiz P, Lopez R, Perez G, Skarmeta A and Taniuchi K (2008). OpenIKEv2, IEICE - Transactions on Information and Systems, E91-D:5, (1319-1329), Online publication date: 1-May-2008.
  42. Cervesato I, Jaggard A, Scedrov A, Tsay J and Walstad C (2008). Breaking and fixing public-key Kerberos, Information and Computation, 206:2-4, (402-424), Online publication date: 1-Feb-2008.
  43. ACM
    Toll D, Karger P, Palmer E, McIntosh S and Weber S (2008). The Caernarvon secure embedded operating system, ACM SIGOPS Operating Systems Review, 42:1, (32-39), Online publication date: 1-Jan-2008.
  44. Niculescu M, Niculescu E and Resceanu I Mobile IP security and scalable support for transparent host mobility on the internet Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7, (214-221)
  45. ACM
    Ole Kürtz K, Küsters R and Wilke T Selecting theories and nonce generation for recursive protocols Proceedings of the 2007 ACM workshop on Formal methods in security engineering, (61-70)
  46. ACM
    Zhang B, Al-Shaer E, Jagadeesan R, Riely J and Pitcher C Specifications of a high-level conflict-free firewall policy language for multi-domain networks Proceedings of the 12th ACM symposium on Access control models and technologies, (185-194)
  47. Bournelle J, Combes J, Laurent-Maknavicius M and Larafa S Using PANA for mobile IPv6 bootstrapping Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (345-355)
  48. Datta A, Derek A, Mitchell J and Roy A (2007). Protocol Composition Logic (PCL), Electronic Notes in Theoretical Computer Science (ENTCS), 172, (311-358), Online publication date: 1-Apr-2007.
  49. Wu C, Huang C and Irwin J Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy Proceedings of the 2007 spring simulation multiconference - Volume 3, (362-369)
  50. Xu S and Yung M K-anonymous multi-party secret handshakes Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, (72-87)
  51. ACM
    Di Raimondo M, Gennaro R and Krawczyk H Deniable authentication and key exchange Proceedings of the 13th ACM conference on Computer and communications security, (400-409)
  52. Merino P, García-Martínez A, Organero M and Kloos C Enabling practical IPsec authentication for the internet Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (392-403)
  53. Li M and Feng H Chaotically masking traffic pattern to prevent traffic pattern analysis attacks for mission critical applications in computer communication networks Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II, (448-451)
  54. Zúquete A and Marques H A security architecture for protecting LAN interactions Proceedings of the 9th international conference on Information Security, (311-326)
  55. Bellare M New proofs for NMAC and HMAC Proceedings of the 26th annual international conference on Advances in Cryptology, (602-619)
  56. Tschofenig H and Fu X (2006). Securing the Next Steps In Signalling (NSIS) protocol suite, International Journal of Internet Protocol Technology, 1:4, (271-282), Online publication date: 1-Aug-2006.
  57. Koo J, Koo J and Lee D A new authentication scheme of binding update protocol on handover in mobile IPv6 networks Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing, (972-978)
  58. ACM
    Karger P Privacy and security threat analysis of the federal employee personal identity verification (PIV) program Proceedings of the second symposium on Usable privacy and security, (114-121)
  59. Paterson K and Yau A Cryptography in theory and practice Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, (12-29)
  60. Jensen C and Connell P Trust-based route selection in dynamic source routing Proceedings of the 4th international conference on Trust Management, (150-163)
  61. Choi J and Mun Y Mechanism of the secure MAP discovery in hierarchical MIPv6 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II, (895-904)
  62. Chevassut O, Fouque P, Gaudry P and Pointcheval D The Twist-AUgmented technique for key exchange Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography, (410-426)
  63. Yang G, Wong D, Deng X and Wang H Anonymous signature schemes Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography, (347-363)
  64. Cheng Z, Chen L, Comley R and Tang Q Identity-based key agreement with unilateral identity privacy using pairings Proceedings of the Second international conference on Information Security Practice and Experience, (202-213)
  65. Yogender P and Ali H Impact of employing different security levels on QoS parameters in virtual private networks Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks, (142-149)
  66. Masuda S, Suzuki H, Okazaki N and Watanabe A Proposal for a practical cipher communication protocol that can coexist with NAT and firewalls Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks, (713-722)
  67. Smith J, González-Nieto J and Boyd C Modelling denial of service attacks on JFK with Meadows's cost-based framework Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54, (125-134)
  68. Jao D, Miller S and Venkatesan R Do all elliptic curves of the same order have the same difficulty of discrete log? Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security, (21-40)
  69. ACM
    Di Raimondo M, Gennaro R and Krawczyk H Secure off-the-record messaging Proceedings of the 2005 ACM workshop on Privacy in the electronic society, (81-89)
  70. ACM
    Di Raimondo M and Gennaro R New approaches for deniable authentication Proceedings of the 12th ACM conference on Computer and communications security, (112-121)
  71. Ciarletta L and Choi M Automatic configuration for VPN using active XML Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks, (173-180)
  72. Demerjian J, Hajjeh I, Badra M and Ferraz S A secure way to combine IPsec, NAT & DHCP Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (104-118)
  73. Jung S, Choi J, Kim Y and Kim S IPSec support in NAT-PT scenario for IPv6 transition Proceedings of the 8th international conference on Information Security, (194-202)
  74. Wang H, Zhang Y and Li Y Modeling for security verification of a cryptographic protocol with MAC payload Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II, (538-547)
  75. Ontua M and Pancho-Festin S Evaluation of the unified modeling language for security requirements analysis Proceedings of the 6th international conference on Information Security Applications, (68-80)
  76. Krawczyk H HMQV Proceedings of the 25th annual international conference on Advances in Cryptology, (546-566)
  77. Yin H and Wang H Building an application-aware IPsec policy system Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, (21-21)
  78. Lim J, Han M and Kim K Application of IKE protocol for IPsec VPN into embedded system Proceedings of the 9th WSEAS International Conference on Communications, (1-5)
  79. Gilaberte R and Herrero L IP addresses configuration in spontaneous networks Proceedings of the 9th WSEAS International Conference on Computers, (1-6)
  80. Aura T, Nagarajan A and Gurtov A Analysis of the HIP base exchange protocol Proceedings of the 10th Australasian conference on Information Security and Privacy, (481-493)
  81. ACM
    Schütz S, Eggert L, Schmid S and Brunner M (2005). Protocol enhancements for intermittently connected hosts, ACM SIGCOMM Computer Communication Review, 35:3, (5-18), Online publication date: 1-Jul-2005.
  82. Imamoto K and Sakurai K (2005). Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic, Electronic Notes in Theoretical Computer Science (ENTCS), 135:1, (79-94), Online publication date: 1-Jul-2005.
  83. Shin S, Kobara K and Imai H A lower-bound of complexity for RSA-Based password-authenticated key exchange Proceedings of the Second European conference on Public Key Infrastructure, (191-205)
  84. Lee Y, Choi E and Min D An authenticated key exchange mechanism using one-time shared key Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II, (187-194)
  85. ACM
    Ferrante A, Piuri V and Castanier F A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems Proceedings of the 2nd conference on Computing frontiers, (221-229)
  86. Datta A, Derek A, Mitchell J and Pavlovic D (2005). A derivation system and compositional logic for security protocols, Journal of Computer Security, 13:3, (423-482), Online publication date: 1-May-2005.
  87. Rhee Y Secure initialization vector transmission on IP security Proceedings of the 4th international conference on Networking - Volume Part II, (852-858)
  88. Zúquete A (2005). An efficient high quality random number generator for multi-programmed systems, Journal of Computer Security, 13:2, (243-263), Online publication date: 1-Mar-2005.
  89. ACM
    Hansen S, Skriver J and Nielson H Using static analysis to validate the SAML single sign-on protocol Proceedings of the 2005 workshop on Issues in the theory of security, (27-40)
  90. Boyd C Design of secure key establishment protocols Proceedings of the 5th international conference on Cryptology in India, (1-13)
  91. ACM
    Bhargavan K, Corin R, Fournet C and Gordon A Secure sessions for web services Proceedings of the 2004 workshop on Secure web service, (56-66)
  92. Conrad M, Fuhrmann T, Schöller M and Zitterbart M Secure service signaling and fast authorization in programmable networks Proceedings of the 6th IFIP TC6 international working conference on Active networks, (66-77)
  93. ACM
    Diament T, Lee H, Keromytis A and Yung M The dual receiver cryptosystem and its applications Proceedings of the 11th ACM conference on Computer and communications security, (330-343)
  94. ACM
    Molnar D and Wagner D Privacy and security in library RFID Proceedings of the 11th ACM conference on Computer and communications security, (210-219)
  95. ACM
    Xu S and Yung M k-anonymous secret handshakes with reusable credentials Proceedings of the 11th ACM conference on Computer and communications security, (158-167)
  96. Park S, Nah J and Chung K The implementation of IPsec-Based internet security system in IPv4/IPv6 network Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems, (109-116)
  97. Imamoto K and Sakurai K Key-exchange protocol using pre-agreed Session-ID Proceedings of the 5th international conference on Information Security Applications, (375-387)
  98. Hong K, Jung S, Lo Iacono L and Ruland C Impacts of security protocols on real-time multimedia communications Proceedings of the 5th international conference on Information Security Applications, (1-13)
  99. Liu D, Chi C and Li M Normalizing Traffic Pattern with Anonymity for Mission Critical Applications Proceedings of the 37th annual symposium on Simulation
  100. Kanda M, Miyazawa K and Esaki H USAGI IPv6 IPsec Development for Linux Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
  101. Herzberg A and Mass Y (2004). Relying Party Credentials Framework, Electronic Commerce Research, 4:1-2, (23-39), Online publication date: 1-Jan-2004.
  102. ACM
    Datta A, Derek A, Mitchell J and Pavlovic D Secure protocol composition Proceedings of the 2003 ACM workshop on Formal methods in security engineering, (11-23)
  103. ACM
    Basin D, Mödersheim S and Viganò L CDiff Proceedings of the 10th ACM conference on Computer and communications security, (335-344)
  104. ACM
    Kaufman C, Perlman R and Sommerfeld B DoS protection for UDP-based protocols Proceedings of the 10th ACM conference on Computer and communications security, (2-7)
  105. ACM
    Kasera S, Mizikovsky S, Sundaram G and Woo T On securely enabling intermediary-based services and performance enhancements for wireless mobile users Proceedings of the 2nd ACM workshop on Wireless security, (61-68)
  106. Choi M, Kwak D and Moon S A proposal for DoS-defensive internet key exchange Proceedings of the 2003 international conference on Computational science and its applications: PartII, (328-337)
  107. Balfanz D, Durfee G, Shankar N, Smetters D, Staddon J and Wong H Secret Handshakes from Pairing-Based Key Agreements Proceedings of the 2003 IEEE Symposium on Security and Privacy
  108. Sherman A and McGrew D (2003). Key Establishment in Large Dynamic Groups Using One-Way Function Trees, IEEE Transactions on Software Engineering, 29:5, (444-458), Online publication date: 1-May-2003.
  109. Bruschi D and Rosti E (2002). Secure multicast in wireless networks of mobile hosts, Mobile Networks and Applications, 7:6, (503-511), Online publication date: 1-Dec-2002.
  110. ACM
    Aiello W, Bellovin S, Blaze M, Ioannidis J, Reingold O, Canetti R and Keromytis A Efficient, DoS-resistant, secure key exchange for internet protocols Proceedings of the 9th ACM conference on Computer and communications security, (48-58)
  111. ACM
    Keromytis A, Misra V and Rubenstein D (2002). SOS, ACM SIGCOMM Computer Communication Review, 32:4, (61-72), Online publication date: 1-Oct-2002.
  112. ACM
    Keromytis A, Misra V and Rubenstein D SOS Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, (61-72)
  113. Miltchev S, Ioannidis S and Keromytis A A Study of the Relative Costs of Network Security Protocols Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, (41-48)
  114. Sanchez E and Edwards R Optimization of the Establishment of Secure Communication Channels in Wireless Mobile Networks Proceedings of the 16th International Parallel and Distributed Processing Symposium
  115. Braun T and Danzeisen M Secure Mobile IP Communication Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
  116. ACM
    Meadows C and Syverson P Formalizing GDOI group key management requirements in NPATRL Proceedings of the 8th ACM conference on Computer and Communications Security, (235-244)
  117. Hunt R (2001). Tutorial, Computer Communications, 24:14, (1460-1471), Online publication date: 1-Sep-2001.
  118. Gleitz P and Bellovin S Transient addressing for related processes Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  119. ACM
    Perrig A, Szewczyk R, Wen V, Culler D and Tygar J SPINS Proceedings of the 7th annual international conference on Mobile computing and networking, (189-199)
  120. Hardjono T, Baugher M and Harney H Group security association (GSA) management in IP multicast Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (213-228)
  121. ACM
    O'Shea G and Roe M (2001). Child-proof authentication for MIPv6 (CAM), ACM SIGCOMM Computer Communication Review, 31:2, (4-8), Online publication date: 1-Apr-2001.
  122. Cheng P (2001). An architecture for the internet key exchange protocol, IBM Systems Journal, 40:3, (721-746), Online publication date: 1-Mar-2001.
  123. ACM
    Ioannidis S, Keromytis A, Bellovin S and Smith J Implementing a distributed firewall Proceedings of the 7th ACM conference on Computer and Communications Security, (190-199)
  124. Asokan N and Ginzboorg P (2000). Key agreement in ad hoc networks, Computer Communications, 23:17, (1627-1637), Online publication date: 1-Nov-2000.
  125. Zhou J (2000). Further analysis of the Internet key exchange protocol, Computer Communications, 23:17, (1606-1612), Online publication date: 1-Nov-2000.
  126. ACM
    Sierra J and Shepherd S (2000). New phase 1 exchange mode for IKE framework, ACM SIGOPS Operating Systems Review, 34:4, (34-40), Online publication date: 1-Oct-2000.
  127. Smart M, Malan G and Jahanian F Defeating TCP/IP stack fingerprinting Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (17-17)
  128. Zhang Y and Singh B A multi-layer IPsec protocol Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (16-16)
  129. Borella M and Montenegro G RSIP Proceedings of the Workshop on Intelligence at the Network Edge, (3-3)
  130. Zao J, Gahm J, Troxel G, Condell M, Helinek P, Yuan N, Castineyra I and Kent S (1999). A public-key based secure mobile IP, Wireless Networks, 5:5, (373-390), Online publication date: 1-Oct-1999.
  131. de Raadt T, Hallqvist N, Grabowski A, Keromytis A and Provos N Cryptography in OpenBSD Proceedings of the annual conference on USENIX Annual Technical Conference, (33-33)
Contributors

Recommendations