Security Architecture for the Internet Protocol, RFC, vol.4301, 2005. ,
Internet key exchange protocol version 2 (IKEv2), 2014. ,
Deliverable d6.2: Specification of the problems in the high-level specification language, 2003. ,
Key exchange in ipsec revisited: Formal analysis of ikev1 and ikev2, European Symposium on Research in Computer Security, 2011. ,
Analysis of the internet key exchange protocol using the nrl protocol analyzer, Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999. ,
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997. ,
Slowdroid: Turning a smartphone into a mobile attack vector, 2014 International Conference on Future Internet of Things and Cloud, 2014. ,
Arp spoofing, vol.23, 2018. ,
,
Protecting internet key exchange protocol version 2 (ikev2) implementations from distributed denial-of-service attacks, RFC, vol.8019, 2016. ,
A traffic-based method of detecting dead internet key exchange (ike) peers, vol.3706, 2004. ,
Understanding ikev2: Tutorial, and rationale for decisions, RFC Editor, 2003. ,