Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,539 papers from all fields of science
Search
Sign In
Create Free Account
Internet Security Association and Key Management Protocol
Known as:
ISAKMP
, Internet Security Association & Key Management Protocol
, KMP
ISAKMP (Internet Security Association and Key Management Protocol) is a protocol defined by for establishing Security Associations (SA) and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
BSD
Diffie–Hellman key exchange
Group Domain of Interpretation
Internet Key Exchange
Expand
Broader (2)
IPsec
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
An Empirical Examination of Knowledge Management Processes and Market Orientation, Innovation Capability, and Organisational Performance: Insights from Jordan
M. Migdadi
,
M. Zaid
,
M. Yousif
,
Ra'd Almestarihi
,
Khalil Al-Hyari
Journal of Information & Knowledge Management
2017
Corpus ID: 6448386
There are many studies discussing how knowledge management and market orientation (MO) are positively related to innovation, but…
Expand
2011
2011
Extensible authentication method and system based on ISAKMP (Internet Security Association and Key Management Protocol)
梁小萍
,
韦银星
2011
Corpus ID: 64938550
The invention discloses an extensible authentication method based on an internet security association and key management protocol…
Expand
2002
2002
Migration of Internet security protocols to the IPSEC framework
J. M. Sierra
,
J. Hernandez
,
A. Ribagorda
,
N. Jayaram
Proceedings. 36th Annual International Carnahan…
2002
Corpus ID: 60581636
Nowadays it is clear that security protocols will implement a very important part of the communications accomplished through the…
Expand
2000
2000
Internet Security Association and Key Management Protocol (ISAKMP) Keep-Alive Message exchange
Vlado Zafirov
2000
Corpus ID: 169051415
2000
2000
ISAKMP Key Recovery Extension
D. Balenson
,
T. Markham
Computers & security
2000
Corpus ID: 34409015
Review
2000
Review
2000
Denial of service in public key protocols
P. Eronen
2000
Corpus ID: 16502834
Network denial of service attacks have become a widespread problem on the Internet. However, denial of service is often…
Expand
2000
2000
Security issues in control, management and routing protocols
M. Baltatu
,
A. Lioy
,
F. Maino
,
D. Mazzocchi
Comput. Networks
2000
Corpus ID: 14757692
Highly Cited
1999
Highly Cited
1999
DECIDUOUS: decentralized source identification for network-based intrusions
Ho-Yen Chang
,
R. Narayan
,
+7 authors
F. Gong
Integrated Network Management VI. Distributed…
1999
Corpus ID: 18118033
DECIDUOUS is a security management framework for identifying the sources of network-based intrusions. The first key concept in…
Expand
Highly Cited
1999
Highly Cited
1999
Internet security architecture
R. Molva
Comput. Networks
1999
Corpus ID: 1426559
Highly Cited
1998
Highly Cited
1998
Efficient security for large and dynamic multicast groups
G. Caronni
,
M. Waldvogel
,
Dan Sun
,
B. Plattner
Proceedings Seventh IEEE International Workshop…
1998
Corpus ID: 1600160
Proposals for multicast security that have been published so far are complex, often require trust in network components or are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE