The Secure Remote Access Based On IKE
DOI:
Author:
Affiliation:

Funding:

Ethical statement:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
    Abstract:

    Now the network security service is provided by the security gateway.The most widely used protocol is Internet Key Exchange protocol (IKE).The initial IKE standards work well for peers with fixed IP address.But with the development of the network,especial

    Reference
    Related
    Cited by
Get Citation

刘欣 毛玉明.基于IKE的安全远程接入[J]. Journal of Terahertz Science and Electronic Information Technology ,2005,3(1):~58,76

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
History
  • Received:
  • Revised:
  • Adopted:
  • Online:
  • Published: