Maughan et al., 1998 - Google Patents
Internet security association and key management protocol (ISAKMP)Maughan et al., 1998
View HTML- Document ID
- 11700996611501390363
- Author
- Maughan D
- Schertler M
- Schneider M
- Turner J
- Publication year
External Links
Snippet
RFC 2408: Internet Security Association and Key Management Protocol (ISAKMP) [RFC Home]
[TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] Obsoleted by: 4306 HISTORIC Errata
Exist Network Working Group D. Maughan Request for Comments: 2408 National Security …
- 239000003999 initiator 0 description 104
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Maughan et al. | Internet security association and key management protocol (ISAKMP) | |
Kaufman et al. | Internet key exchange protocol version 2 (IKEv2) | |
Kaufman | Internet key exchange (IKEv2) protocol | |
Seth et al. | Practical security for disconnected nodes | |
US6993651B2 (en) | Security protocol | |
Gurtov | Host identity protocol (HIP): towards the secure mobile internet | |
Karn et al. | Photuris: Session-key management protocol | |
US7036010B2 (en) | Method and apparatus for a secure communications session with a remote system via an access-controlling intermediate system | |
US7096362B2 (en) | Internet authentication with multiple independent certificate authorities | |
US6952768B2 (en) | Security protocol | |
US8281127B2 (en) | Method for digital identity authentication | |
Maughan et al. | RFC2408: Internet Security Association and Key Management Protocol (ISAKMP) | |
JPH07193569A (en) | Method of maintaining safety of communication and device that safely transfers data | |
JP2004295891A (en) | Method for authenticating packet payload | |
Kaufman et al. | Rfc 7296: Internet key exchange protocol version 2 (ikev2) | |
KR20090098542A (en) | Encryption data communication system using proxy and method for encryption data communication thereof | |
JP4783340B2 (en) | Protecting data traffic in a mobile network environment | |
US20080104693A1 (en) | Transporting keys between security protocols | |
Thalhammer | Security inVoIP-Telephony Systems | |
Rösler et al. | Interoperability between messaging services secure–implementation of encryption | |
Schneider et al. | Network Working Group D. Maughan Request for Comments: 2408 National Security Agency Category: Standards Track M. Schertler Securify, Inc. | |
Wang | Security issues to tele-medicine system design | |
JP2004032699A (en) | Apparatus for issuing public key certificate | |
Eronen et al. | Internet key exchange protocol version 2 (IKEv2) | |
WO2023130970A1 (en) | Trusted measurement-integrated communication method and apparatus |