TITLE

ISAKMP

PUB. DATE
April 2016
SOURCE
Computer Desktop Encyclopedia;Apr2016, p1
SOURCE TYPE
Encyclopedia
DOC. TYPE
Reference Entry
ABSTRACT
(Internet Security Association and Key Management Protocol) A framework for establishing trusted interactions among entities using TCP/IP. See IKE.
ACCESSION #
114224147

 

Related Articles

  • Security without bandwidth strain.  // Communications News;Sep96, Vol. 33 Issue 9, p8 

    Focuses on the Internet Security Association Key Management Protocol (ISAKMP). Goal of the ISAKMP; Features of the security architecture.

  • Protocols Guide: Network Security Technologies and Protocols: Secured Routing Protocols: IPsec ISAKMP: Internet Security Association and Key Management Protocol.  // Network Protocols Handbook;2007, p100 

    Information on the Internet Security Association and Key Management Protocol (ISAKMP) from a chapter of the book "Network Protocols Handbook," Fourth Edition is presented. ISAKMP is a key protocol in the Internet security architecture that combines security concepts of authentication, key...

  • IKE.  // Computer Desktop Encyclopedia;2015, p1 

    (Internet Key Exchange) A method for establishing a security association (SA) that authenticates users, negotiates the encryption method and exchanges the secret key. IKE is used in the IPsec protocol. Derived from the ISAKMP framework for key exchange an

  • Internet Security Association and Key Management Protocol.  // Network Dictionary;2007, p255 

    An encyclopedia entry on "Internet Security Association and Key Management Protocol" (ISAKMP) is presented. It is a key protocol in the IPsec architecture. It also combines the security concepts of authentication, key management and security associations to establish the required security for...

  • IKE.  // Computer Desktop Encyclopedia;10/1/2011, p1 

    (Internet Key Exchange) A method for establishing a security association (SA) that authenticates users, negotiates the encryption method and exchanges the secret key. IKE is used in the IPsec protocol. Derived from the ISAKMP framework for key exchange and the Oakley and SKEME key exchange...

  • Sun tries to SKIP the competition. Kerstetter, Jim; Graziano, Claudia // PC Week;02/16/98, Vol. 15 Issue 7, p10 

    Reveals that Sun Microsystems Inc. is pushing the Simple Key management for Internet Protocols (SKIP) key-exchange protocol. Why the Internet Engineering Task Force chose the Internet Security Association and Key Management Protocol/Oakley Key Determination Protocol (ISAKMP) over SKIP;...

  • Domain of Interpretation.  // Network Dictionary;2007, p159 

    An encyclopedia entry for "Domain of Interpretation (DOI)" is presented. In Internet Protocol (IP) security, DOI is used to define payload formats, exchange types, and conventions for naming security-relevant information. Such information may include security policies or cryptographic algorithms...

  • DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network. Padmavathi, G.; Subashini, P.; Aruna, D. Devi // International Journal of Network Security & Its Applications;Jan2012, Vol. 4 Issue 1, p69 

    The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer...

  • Ask Dr. Internet. Blass, Steve // Network World;4/19/2004, Vol. 21 Issue 16, p25 

    A company uses Nortel's Contivity Virtual Private Network (VPN) Client to connect to company A. They have to connect to company B using another version of the VPN client. Can it maintain both connections to both companies using one personal computer? Is it possible to use just one version of the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics