Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Internet Security Association and Key Management Protocol

Known as: ISAKMP, Internet Security Association & Key Management Protocol, KMP 
ISAKMP (Internet Security Association and Key Management Protocol) is a protocol defined by for establishing Security Associations (SA) and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2005
Highly Cited
2005
This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing… Expand
  • figure 2
  • figure 3
  • figure 9
Is this relevant?
2005
2005
The IP Security Authentication Header (AH) and Encapsulating Security Payload (ESP) protocols use a sequence number to detect… Expand
Is this relevant?
2002
2002
Nowadays it is clear that security protocols will implement a very important part of the communications accomplished through the… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We show how the NRL Protocol Analyzer, a special-purpose formal methods tool designed for the verification of cryptographic… Expand
Is this relevant?
1999
1999
Fear of security breaches has been a major reason for the business world's reluctance to embrace the Internet as a viable means… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 2
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This memo describes a protocol utilizing security concepts necessary for establishing Security Associations (SA) and… Expand
  • figure 1
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The Internet Security Association and Key Management Protocol (ISAKMP) defines a framework for security association management… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This document describes a protocol, named OAKLEY, by which two authenticated parties can agree on secure and secret keying… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Proposals for multicast security that have been published so far are complex, often require trust in network components or are… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1998
1998
A generic key management API that can be used not only for IP Security [Atk95a] [Atk95b] [Atk95c] but also for other network… Expand
Is this relevant?