Login / Signup

Methods and protocols for secure key negotiation using IKE.

Michael S. Borella
Published in: IEEE Netw. (2000)
Keyphrases
  • preprocessing
  • computational cost
  • decision making
  • empirical studies