Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,389,629 papers from all fields of science
Search
Sign In
Create Free Account
Internet Key Exchange
Known as:
IKEv2
, Internet Key
, IKE
Expand
In computing, Internet Key Exchange (IKE, sometimes IKEv1 or IKEv2, depending on version) is the protocol used to set up a security association (SA…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
43 relations
BSD
Cain and Abel
Common Criteria
Cryptographic accelerator
Expand
Broader (1)
IPsec
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Individual Investor Perceptions and Behavior During the Financial Crisis
A. Hoffmann
,
Thomas Post
,
J. Pennings
2012
Corpus ID: 56447172
Combining monthly survey data with matching trading records, we examine how individual investor perceptions change and drive…
Expand
Highly Cited
2011
Highly Cited
2011
IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap
S. Frankel
,
S. Krishnan
Request for Comments
2011
Corpus ID: 20384364
Over the past few years, the number of RFCs that define and use IPsec and IKE has greatly proliferated. This is complicated by…
Expand
Highly Cited
2011
Highly Cited
2011
Earthworm avoidance of biochar can be mitigated by wetting
Dong Li
,
W. Hockaday
,
C. Masiello
,
P. Alvarez
2011
Corpus ID: 52062387
Highly Cited
2011
Highly Cited
2011
Securing communication in 6LoWPAN with compressed IPsec
S. Raza
,
S. Duquennoy
,
Antony Chung
,
Dogan Yazar
,
T. Voigt
,
U. Roedig
International Conference on Distributed Computing…
2011
Corpus ID: 17540348
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able…
Expand
Highly Cited
2010
Highly Cited
2010
Performance assessment of topologically diverse power systems subjected to hurricane events
James Winkler
,
L. Dueñas-Osorio
,
R. Stein
,
D. Subramanian
Reliability Engineering & System Safety
2010
Corpus ID: 14562619
Review
2009
Review
2009
Evidence of the accelerated expansion of the Universe from weak lensing tomography with COSMOS
T. Schrabback
,
J. Hartlap
,
+19 authors
M. Velander
2009
Corpus ID: 54505515
We present a comprehensive analysis of weak gravitational lensing by large-scale structure in the Hubble Space Telescope Cosmic…
Expand
Highly Cited
2004
Highly Cited
2004
A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols
Yannick Chevalier
,
L. Compagna
,
+4 authors
L. Vigneron
2004
Corpus ID: 10802331
This paper presents HLPSL, a high level protocol specification language for the modelling of security-sensitive cryptographic…
Expand
Highly Cited
2003
Highly Cited
2003
Internet Key Exchange
Xu Mei
2003
Corpus ID: 63948317
With the expeditious development of Internet, the security of communication is one of the most essential elements.Internet Key…
Expand
Highly Cited
1995
Highly Cited
1995
N-VERSION PROGRAMMINC: A FAULT-TOLERANCE APPROACH TO RELlABlLlTY OF SOFTWARE OPERATlON
Liming Chen
,
A. Avizienis
Twenty-Fifth International Symposium on Fault…
1995
Corpus ID: 33726017
N-version programing is defined as the independent generation of N2 2 functionally e quivalent prograns fran the sme initial…
Expand
Highly Cited
1990
Highly Cited
1990
The design of organic structures in the solid state: hydrogen-bonded molecular "tapes"
Jonathan A. Zerkowski
,
C. Seto
,
D. A. Wierda
,
G. Whitesides
1990
Corpus ID: 94283280
We have begun a program whose objective is to develop methods to pred ic t the pack ing of organic molecu les in crys ta l l ine…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE