Open Access
MATEC Web Conf.
Volume 218, 2018
The 1st International Conference on Industrial, Electrical and Electronics (ICIEE 2018)
Article Number 03001
Number of page(s) 6
Section Information Technology
Published online 26 October 2018
  1. A. Marwa, B. Malika, and G. Nacira, “Contribution to enhance IPSec security by a safe and efficient internet key exchange protocol,” 2013 World Congr. Comput. Inf. Technol. WCCIT 2013, pp. 1–5, (2013). [Google Scholar]
  2. P. Lubomski and H. Krawczyk, “Practical Evaluation of Internet Systems’ Security Mechanisms,” IEEE Secur. Priv., vol. 15, no. 1, pp. 32–40, (2017). [CrossRef] [Google Scholar]
  3. J. L. Shah and J. Parvez, “Impact of IPSec on Real Time applications in IPv6 and 6to4 Tunneled Migration Network,” ICIIECS 2015 - 2015 IEEE Int. Conf. Innov. Information, Embed. Commun. Syst., pp. 0–5, (2015). [Google Scholar]
  4. C. Kaufman, “Internet Key Exchange Protocol Version 2 (IKEv2),” RFC 7296, pp. 1–142, (2014). [Google Scholar]
  5. S. Frankel, “IP Security (IPSec) and Internet Key Exchange (IKE) Document Roadmap,” RFC 6071, pp. 1–63, (2011). [Google Scholar]
  6. R. S. Pavel, Network Security Advance, vol. 3. Mumbay: University of Mumbay, (2015). [Google Scholar]
  7. B. A. Forouzan, Data Communications and Networking Third Edition. New York: McGraw-Hill, (2003). [Google Scholar]
  8. D. Harkins, “The Internet Key Exchange (IKE),” RFC 2409, (1998). [Google Scholar]
  9. M. Baushke, “More Modular Exponentiation (MODP) Diffie-Hellman (DH) Key Exchange (KEX) Groups for Secure Shell (SSH),” RFC 8268, (2017). [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.