مبادله کلید اینترنت (Persian Wikipedia)

Analysis of information sources in references of the Wikipedia article "مبادله کلید اینترنت" in Persian language version.

refsWebsite
Global rank Persian rank
214th place
1,769th place
1st place
1st place
153rd place
587th place
low place
low place
66th place
378th place
4,983rd place
low place
low place
low place
5,032nd place
low place
699th place
953rd place
2,882nd place
5,252nd place
5,990th place
low place

cisco.com

blogs.cisco.com

iacr.org

eprint.iacr.org

ietf.org

tools.ietf.org

  • The Internet Key Exchange (IKE), RFC 2409, §1 Abstract
  • RFC 3129: Requirements for Kerberized Internet Negotiation of Keys, Internet Engineering Task Force, June 2001, p. 1
  • RFC 4322: Opportunistic Encryption using the Internet Key Exchange (IKE), Internet Engineering Task Force, June 2001, p. 5
  • "RFC 2409 The Internet Key Exchange (IKE)", Internet Engineering Task Force (IETF), p. 5
  • "RFC 2409 The Internet Key Exchange (IKE)", Internet Engineering Task Force (IETF), p. 6
  • "RFC 2409 The Internet Key Exchange (IKE)", Internet Engineering Task Force (IETF), p. 10-16
  • "RFC 4306 Internet Key Exchange (IKEv2) Protocol", Internet Engineering Task Force (IETF), p. 11,33
  • "RFC 4306: Internet Key Exchange (IKEv2) Protocol", Internet Engineering Task Force (IETF), p 38-40

ietf.org

jhu.edu

skysrv.pha.jhu.edu

microsoft.com

technet.microsoft.com

nohats.ca

securityfocus.com

  • «Using IPSec in Windows 2000 and XP, Part 1». بایگانی‌شده از اصلی در ۱۲ اكتبر ۲۰۰۸. دریافت‌شده در ۱۵ ژوئن ۲۰۲۰. تاریخ وارد شده در |archive-date= را بررسی کنید (کمک)

spiegel.de

usenix.org

web.archive.org

  • «Using IPSec in Windows 2000 and XP, Part 1». بایگانی‌شده از اصلی در ۱۲ اكتبر ۲۰۰۸. دریافت‌شده در ۱۵ ژوئن ۲۰۲۰. تاریخ وارد شده در |archive-date= را بررسی کنید (کمک)
  • Pliam, John (2 October 1999). "Authentication Vulnerabilities in IKE and Xauth with Weak Pre-Shared Secrets". Johns Hopkins University. Archived from the original on 14 April 2002. Retrieved 5 February 2020.
  • McGrew, David (5 July 2011). "Great Cipher, But Where Did You Get That Key". Cisco Blog. Archived from the original on 9 July 2011. Retrieved 11 February 2020.

weizmann.ac.il

wisdom.weizmann.ac.il