Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
135 | Kaisa Nyberg |
IKE in Ad Hoc IP Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers, pp. 139-151, 2004, Springer, 3-540-24396-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ad hoc access, ad hoc authentication, ad hoc networking, key management, message authentication code, peer-to-peer communication, security association, IKEv2 |
131 | Lari Iso-Anttila, Jorma Ylinen, Pekka Loula |
A Proposal to Improve IKEv2 negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 169-174, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
94 | Mohammad Mahdi Karbasioun, Mehdi Berenjkub, Bahareh Taji |
A Modified Version of IKEv2 for Using in Client-Server Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 5-8 May 2008, Halifax, Nova Scotia, Canada, pp. 617-623, 2008, IEEE Computer Society, 978-0-7695-3135-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Signature, Client-Server, IKEv2, DoS attack |
92 | Ningning Lu, Huachun Zhou, Yajuan Qin |
A comparison study of IKE protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 88, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IKEv1, authentication keywords, pre-shared-key, cookie, IKEv2 |
67 | Paulo S. Pagliusi, Chris J. Mitchell |
PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 135-149, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
64 | Paul Fleischer, Lars Michael Kristensen |
Formal Specification and Validation of Secure Connection Establishment in a Generic Access Network Scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Petri Nets ![In: Applications and Theory of Petri Nets, 29th International Conference, PETRI NETS 2008, Xi'an, China, June 23-27, 2008. Proceedings, pp. 171-190, 2008, Springer, 978-3-540-68745-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Tristan Ninet |
Formal verification of the Internet Key Exchange (IKEv2) security protocol. (Vérification formelle du protocole d'échange de clé IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
48 | Violeta Cakulev, Avi Lior, Semyon Mizikovsky |
Diameter IKEv2 SK: Using Shared Keys to Support Interaction between IKEv2 Servers and Diameter Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6738, pp. 1-17, October 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
43 | Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld |
DoS protection for UDP-based protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 2-7, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
buffer exhaustion, network security, DoS, denial of service, fragmentation, IPsec, protocol design, IKE |
27 | Pedro Javier Fernández Ruiz, Cristian A. Nieto Guerra, Antonio Fernandez Gómez-Skarmeta |
Deployment of a Secure Wireless Infrastructure Oriented to Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 1108-1114, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Open-Source Implementation, Mobility, Authentication, WiMAX, Vehicular Networks, IPsec, EAP, IKEv2 |
27 | Serkan Ayaz, Christian Bauer 0002, Max Ehammer |
Applying IKE/IPsec context transfer to aeronautical networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBIWAC ![In: Proceedings of the Seventh ACM International Workshop on Mobility Management & Wireless Access, MOBIWAC 2009, Tenerife, Canary Islands, Spain, October 26-27, 2009, pp. 123-127, 2009, ACM, 978-1-60558-617-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cxtp, ipsec, network mobility, aviation, ikev2 |
27 | Christos Xenakis, Christoforos Ntantogian |
Security architectures for B3G mobile networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 35(3-4), pp. 123-139, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
B3G networks, EAP-SIM, EAP-AKA, WLAN, 3G, 802.11i, IKEv2 |
24 | Paul Wouters, Sahana Prasad |
Labeled IPsec Traffic Selector Support for the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9478, pp. 1-7, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Valery Smyslov |
Using GOST Cryptographic Algorithms in the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9385, pp. 1-148, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Mohamed Boucadair, T. Reddy K., Dan Wing, Valery Smyslov |
Internet Key Exchange Protocol Version 2 (IKEv2) Configuration for Encrypted DNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9464, pp. 1-16, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Cen Jung Tjhai, Martin Tomlinson, Graham Bartlett, Scott R. Fluhrer, Daniel Van Geest, Óscar García-Morchón, Valery Smyslov |
Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9370, pp. 1-29, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Sophie Stevens |
Formal verification of the post-quantum security properties of IKEv2 PPK (RFC 8784) using the Tamarin Prover. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1753, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
24 | Myeongji Ko, Hyogon Kim, Sung-Gi Min |
An IKEv2-Based Hybrid Authentication Scheme for Simultaneous Access Network and Home Network Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Commun. ![In: IEICE Trans. Commun. 105-B(2), pp. 250-258, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Valery Smyslov |
Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9242, pp. 1-14, May 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Valery Smyslov |
Using GOST Ciphers in the Encapsulating Security Payload (ESP) and Internet Key Exchange Version 2 (IKEv2) Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9227, pp. 1-22, March 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Mohamed Boucadair |
Internet Key Exchange Protocol Version 2 (IKEv2) Notification Status Types for IPv4/IPv6 Coexistence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8983, pp. 1-7, February 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Stefan-Lukas Gazdag, Sophia Grundner-Culemann, Tobias Guggemos, Tobias Heider, Daniel Loebenberger |
A formal analysis of IKEv2's post-quantum extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021, pp. 91-105, 2021, ACM, 978-1-4503-8579-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Scott R. Fluhrer, Panos Kampanakis, David A. McGrew, Valery Smyslov |
Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8784, pp. 1-16, June 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Sven Schäge, Jörg Schwenk, Sebastian Lauer |
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 1519, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
24 | Sven Schäge, Jörg Schwenk, Sebastian Lauer |
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 567-596, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Shahid Raza, Runar Mar Magnusson |
TinyIKE: Lightweight IKEv2 for Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 6(1), pp. 856-866, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Kiki Rizki, Argyro Lamproudi, Marco Tiloca, Shahid Raza |
Group-IKEv2 for multicast IPsec in the internet of things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 14(1), pp. 10-22, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Tommy Pauly, Paul Wouters |
Split DNS Configuration for the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8598, pp. 1-16, May 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra |
The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE ![In: 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 13th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019, pp. 66-74, 2019, IEEE, 978-1-7281-2777-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra |
Model Checking the IKEv2 Protocol Using Spin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 17th International Conference on Privacy, Security and Trust, PST 2019, Fredericton, NB, Canada, August 26-28, 2019, pp. 1-7, 2019, IEEE, 978-1-7281-3265-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Yoav Nir |
Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8420, pp. 1-5, August 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Yanpeng Cui, Ting Yu, Jianwei Hu 0002 |
IKEv2 Protocol Fuzzing Test on Simulated ASA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartIoT ![In: 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), Xi'an, China, August 17-19, 2018, pp. 111-116, 2018, IEEE, 978-1-5386-8543-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | M. Lavanya, V. Natarajan |
Lightweight key agreement protocol for IoT based on IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 64, pp. 580-594, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Yoav Nir, Tero Kivinen, Paul Wouters, Daniel Migault |
Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8247, pp. 1-19, September 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Nils gentschen Felde, Tobias Guggemos, Tobias Heider, Dieter Kranzlmüller |
Secure group key distribution in constrained environments with IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: IEEE Conference on Dependable and Secure Computing, DSC 2017, Taipei, Taiwan, August 7-10, 2017, pp. 384-391, 2017, IEEE, 978-1-5090-5569-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Tero Kivinen, Paul Wouters, Hannes Tschofenig |
Generic Raw Public-Key Support for IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7670, pp. 1-10, January 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Yoav Nir, Valery Smyslov |
Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8019, pp. 1-32, November 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Daniel Migault, Valery Smyslov |
Cloning the IKE Security Association in the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7791, pp. 1-14, March 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Tero Kivinen |
Minimal Internet Key Exchange Version 2 (IKEv2) Initiator Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7815, pp. 1-41, March 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Yoav Nir, Simon Josefsson |
Curve25519 and Curve448 for the Internet Key Exchange Protocol Version 2 (IKEv2) Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8031, pp. 1-8, December 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Jay Bryan R. Lawas, Allan C. Vivero, Ankit Sharma |
Network performance evaluation of VPN protocols (SSTP and IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOCN ![In: Thirteenth International Conference on Wireless and Optical Communications Networks, WOCN 2016, Hyderabad, Telangana State, India, July 21-23, 2016, pp. 1-5, 2016, IEEE, 978-1-4673-8975-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Kostas Pentikousis, Emma Zhang, Yang Cui |
IKEv2-Derived Shared Secret Key for the One-Way Active Measurement Protocol (OWAMP) and Two-Way Active Measurement Protocol (TWAMP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7717, pp. 1-15, December 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Tero Kivinen, Joel Snyder |
Signature Authentication in the Internet Key Exchange Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7427, pp. 1-18, January 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Aeneas Dodd-Noble, Sri Gundavelli, Jouni Korhonen, Florin Baboescu, Brian Weis |
3GPP IP Multimedia Subsystems (IMS) Option for the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7651, pp. 1-10, September 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Valery Smyslov, Paul Wouters |
The NULL Authentication Method in the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7619, pp. 1-12, August 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Do Hyeon Lee, Jeom Goo Kim |
IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 18(3), pp. 493-501, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Bruno Faria 0002, Jouni Korhonen, Eduardo Souto |
A comparison study between the TLS-based security framework and IKEv2 when protecting DSMIPv6 signaling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 36(3), pp. 489-500, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Charlie Kaufman, Paul E. Hoffman, Yoav Nir, Pasi Eronen, Tero Kivinen |
Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7296, pp. 1-142, October 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Valery Smyslov |
Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7383, pp. 1-20, November 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Xiaojin Yang, Jianhua Liu |
The Implementation of IKEV2 for IPSec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudComp ![In: Cloud Computing - 5th International Conference, CloudComp 2014, Guilin, China, October 19-21, 2014, Revised Selected Papers, pp. 175-180, 2014, Springer, 978-3-319-16049-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Yoav Nir, Qin Wu |
An Internet Key Exchange Protocol Version 2 (IKEv2) Extension to Support EAP Re-authentication Protocol (ERP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6867, pp. 1-9, January 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Yaron Sheffer, Scott R. Fluhrer |
Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6989, pp. 1-10, July 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Johannes Merkle, Manfred Lochter |
Using the Elliptic Curve Cryptography (ECC) Brainpool Curves for the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6954, pp. 1-11, July 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Ahmad AlSa'deh, Christoph Meinel, Florian Westphal, Marian Gawron, Björn Groneberg |
CGA integration into IPsec/IKEv2 authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 326-330, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Dennis Kügler, Yaron Sheffer |
Password Authenticated Connection Establishment with the Internet Key Exchange Protocol version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6631, pp. 1-26, June 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | SeongHan Shin, Kazukuni Kobara |
Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6628, pp. 1-20, June 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Tero Kivinen |
Secure Password Framework for Internet Key Exchange Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6467, pp. 1-10, December 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Raj Singh, G. Kalyani, Yoav Nir, Yaron Sheffer, Dacheng Zhang |
Protocol Support for High Availability of IKEv2/IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6311, pp. 1-26, July 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Pedro Javier Fernández Ruiz, Antonio F. Skarmeta |
Providing security using IKEv2 in a vehicular network based on WiMAX technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 2011 IEEE Consumer Communications and Networking Conference, CCNC 2011, Las Vegas, NV, 9-12 January, 2011, pp. 282-286, 2011, IEEE, 978-1-4244-8789-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Cas Cremers |
Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 315-334, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Yaron Sheffer, Hannes Tschofenig |
Internet Key Exchange Protocol Version 2 (IKEv2) Session Resumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5723, pp. 1-26, January 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Charlie Kaufman, Paul E. Hoffman, Yoav Nir, Pasi Eronen |
Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5996, pp. 1-138, September 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Sean Shen, Yu Mao, N. Siva Srinivasa Murthy |
Using Advanced Encryption Standard Counter Mode (AES-CTR) with the Internet Key Exchange version 02 (IKEv2) Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5930, pp. 1-6, July 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Pasi Eronen, Julien Laganier, Cheryl Madson |
IPv6 Configuration in Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5739, pp. 1-32, February 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Pasi Eronen, Hannes Tschofenig, Yaron Sheffer |
An Extension for EAP-Only Authentication in IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5998, pp. 1-16, September 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Emre Ertekin, Chris Christou, Rohan Jasani, Tero Kivinen, Carsten Bormann |
IKEv2 Extensions to Support Robust Header Compression over IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5857, pp. 1-13, May 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | David E. Fu, Jerome A. Solinas |
Elliptic Curve Groups modulo a Prime (ECP Groups) for IKE and IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5903, pp. 1-16, June 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Yoav Nir, Hannes Tschofenig, Hui Deng, Rajeshwar Singh |
A Childless Initiation of the Internet Key Exchange Version 2 (IKEv2) Security Association (SA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6023, pp. 1-7, October 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Zoltán Faigl, Stefan Lindskog, Anna Brunström |
Performance evaluation of IKEv2 authentication methods in next generation wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 3(1), pp. 83-98, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Vijay Devarapalli, Kilian Weniger |
Redirect Mechanism for the Internet Key Exchange Protocol Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5685, pp. 1-15, November 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Peng Yang, Yuanchen Ma, Satoshi Yoshizawa |
Fast Re-estabilishment of IKEv2 Security Associations for Recovery of IPsec Gateways in Mobile Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 111-116, 2009, INSTICC Press, 978-989-674-005-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
24 | Alejandro Pérez-Méndez, Pedro Javier Fernández Ruiz, Rafael Marín López, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta, Kenichi Taniuchi |
OpenIKEv2: Design and Implementation of an IKEv2 Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 91-D(5), pp. 1319-1329, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Hannes Tschofenig, Dirk Kröselberg, Andreas Pashalidis, Yoshihiro Ohba, Florent Bersani |
The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5106, pp. 1-33, February 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | David L. Black 0001, David A. McGrew |
Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5282, pp. 1-19, August 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Vijay Devarapalli, Pasi Eronen |
Secure Connectivity and Mobility Using Mobile IPv4 and IKEv2 Mobility and Multihoming (MOBIKE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5266, pp. 1-15, June 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Vijay Devarapalli, Francis Dupont |
Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4877, pp. 1-26, April 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Michael Myers, Hannes Tschofenig |
Online Certificate Status Protocol (OCSP) Extensions to IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4806, pp. 1-11, February 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | David E. Fu, Jerome A. Solinas |
IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4754, pp. 1-15, January 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | David E. Fu, Jerome A. Solinas |
ECP Groups For IKE and IKEv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4753, pp. 1-16, January 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Brian Korver |
The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4945, pp. 1-43, August 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Zoltán Faigl, Stefan Lindskog, Anna Brunström |
Analyzing IKEv2 Performance when Protecting Mobile IPv6 Signaling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWCS ![In: Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, ISWCS 2007, Trondheim, Norway, 16-19 October 2007., pp. 390-395, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Fabio Maino, David L. Black 0001 |
Use of IKEv2 in the Fibre Channel Security Association Management Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4595, pp. 1-16, July 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Tero Kivinen, Hannes Tschofenig |
Design of the IKEv2 Mobility and Multihoming (MOBIKE) Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4621, pp. 1-30, August 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Pasi Eronen |
IKEv2 Mobility and Multihoming Protocol (MOBIKE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4555, pp. 1-33, June 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Pasi Eronen, Paul E. Hoffman |
IKEv2 Clarifications and Implementation Guidelines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4718, pp. 1-58, October 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Yoav Nir |
Repeated Authentication in Internet Key Exchange (IKEv2) Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4478, pp. 1-5, April 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Pasi Eronen, Jouni Korhonen |
Multiple Authentication Exchanges in the Internet Key Exchange (IKEv2) Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4739, pp. 1-11, November 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Jeffrey I. Schiller |
Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4307, pp. 1-6, December 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Charlie Kaufman |
Internet Key Exchange (IKEv2) Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4306, pp. 1-99, December 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Steffen Schulz 0001, Ahmad-Reza Sadeghi |
Secure VPNs for Trusted Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 197-216, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Khaled Masmoudi, Hossam Afifi |
Building identity-based security associations for provider-provisioned virtual private networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 39(3-4), pp. 215-222, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IPsec security associations, Internet key exchange protocol, Provider-provisioned VPNs, Applied identity-based cryptography |
21 | Arnab Roy 0001, Anupam Datta, John C. Mitchell |
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, pp. 312-329, 2007, Springer, 978-3-540-78662-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Julien Bournelle, Jean Michel Combes, Maryline Laurent-Maknavicius, Sondes Larafa |
Using PANA for Mobile IPv6 Bootstrapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings, pp. 345-355, 2007, Springer, 978-3-540-72605-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Muhammad Sher, Thomas Magedanz |
3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 198-205, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Yu-Ching Hsu, Pai-Feng Tsai |
A Practical Mechanism for Vertical Handoff in WLAN/3G Integrated Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 63rd IEEE Vehicular Technology Conference, VTC Spring 2006, 7-10 May 2006, Melbourne, Australia, pp. 393-396, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|