Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,223,237 papers from all fields of science
Search
Sign In
Create Free Account
Oakley protocol
Known as:
OAKLEY (protocol)
, Oakley
The Oakley Key Determination Protocol is a key-agreement protocol that allows authenticated parties to exchange keying material across an insecure…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Diffie–Hellman key exchange
Internet Key Exchange
Internet Security Association and Key Management Protocol
Key-agreement protocol
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Group Work Can Be Gratifying: Understanding & Overcoming Resistance to Cooperative Learning
Junko Shimazoe
,
H. Aldrich
2010
Corpus ID: 55284529
Despite decades of successful implementation at the K–12 level, cooperative learning (CL) has been slow to catch on at the…
Expand
Review
2009
Review
2009
Women Directors on Corporate Boards: A Review and Research Agenda
S. Terjesen
,
R. Sealy
,
Val Singh
2009
Corpus ID: 54949383
Manuscript Type: Conceptual (Review) Research Question/Issue: This review examines how gender diversity on corporate boards…
Expand
Highly Cited
2009
Highly Cited
2009
Achieving Unity of Effort: Leveraging Interagency Cooperation Between the Department of Defense (DOD) and the United States Agency for International Development (USAID)
Q. Nguyen
2009
Corpus ID: 151163305
Abstract : America's wars cannot be won simply by applying lethal effects. The U.S. military can defeat any adversary using…
Expand
Highly Cited
2008
Highly Cited
2008
Harry Potter and the Order of the Phoenix
Gemma Samuell
International Conference on Computer Graphics and…
2008
Corpus ID: 32756035
Digital Artists Ben Aickin Simon J. Allen Rob Allman Ohkba Ameziane-Hassani James Atkinson Mark Bailey Felix Balbas Harry Bardak…
Expand
Highly Cited
2007
Highly Cited
2007
WHY “WHAT WORKS” WON’T WORK: EVIDENCE‐BASED PRACTICE AND THE DEMOCRATIC DEFICIT IN EDUCATIONAL RESEARCH
G. Biesta
2007
Corpus ID: 55141656
Why ‘what works’ won’t work. Evidence-based practice and the democratic deficit of educational research
Highly Cited
1998
Highly Cited
1998
Internet Security Association and Key Management Protocol (ISAKMP)
W. D. Maughan
,
Mark Schertler
,
Mark Schneider
,
J. Turner
Request for Comments
1998
Corpus ID: 27376202
This memo describes a protocol utilizing security concepts necessary for establishing Security Associations (SA) and…
Expand
Highly Cited
1997
Highly Cited
1997
The OAKLEY Key Determination Protocol
H. Orman
Request for Comments
1997
Corpus ID: 6000020
This document describes a protocol, named OAKLEY, by which two authenticated parties can agree on secure and secret keying…
Expand
Highly Cited
1993
Highly Cited
1993
'It's great to have someone to talk to': Ethics and politics of interviewing women.
J. Finch
1993
Corpus ID: 18880451
Janet Finch's chapter explores some of the ethical problems involved in interviewing women. Drawing on her own work in which she…
Expand
Review
1988
Review
1988
Measures of Memory
A. Richardson-Klavehn
,
R. Bjork
1988
Corpus ID: 317589
ionist Positions Abstractionist positions view implicit memory as reflecting modification of the state of abstract lexical…
Expand
Highly Cited
1985
Highly Cited
1985
How many memory systems are there
E. Tulving
1985
Corpus ID: 36203045
Memory is made up of a number of interrelated systems, organized structures of operating components consisting of neural…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE