WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Problem areas for the IP security protocols
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
DoS protection for UDP-based protocols
Proceedings of the 10th ACM conference on Computer and communications security
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Information Systems Security
Experiences with host-to-host IPsec
Proceedings of the 13th international conference on Security protocols
A survey on automatic configuration of virtual private networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key exchange in IPsec revisited: formal analysis of IKEv1 and IKEv2
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Deniable authenticated key establishment for internet protocols
Proceedings of the 11th international conference on Security Protocols
A secure p2p video conference system for enterprise environments
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
An authenticated key exchange mechanism using one-time shared key
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Analysis of the HIP base exchange protocol
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Design of secure key establishment protocols: successes, failures and prospects
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Hi-index | 0.00 |
The IPSec (IP Security) protocol is a recently proposed standard of the Internet Engineering Task Force (IETF) for securing real-time communications on the Internet. The authors explain how its Internet Key Exchange (IKE) mechanism works and suggest improvements