<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.tschofenig-eap-ikev2" target="https://datatracker.ietf.org/doc/html/draft-tschofenig-eap-ikev2-15">
   <front>
      <title>The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method</title>
      <author initials="F." surname="Bersani" fullname="Florent Bersani">
         <organization>France Telecom</organization>
      </author>
      <author initials="A." surname="Pashalidis" fullname="Andreas Pashalidis">
         <organization>NEC</organization>
      </author>
      <author initials="D." surname="Kroeselberg" fullname="Dirk Kroeselberg">
         <organization>Nokia Siemens Networks</organization>
      </author>
      <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
         <organization>Nokia Siemens Networks</organization>
      </author>
      <author initials="Y." surname="Ohba" fullname="Yoshihiro Ohba">
         <organization>Toshiba</organization>
      </author>
      <date month="September" day="27" year="2007" />
      <abstract>
	 <t>This document specifies EAP-IKEv2, an Extensible Authentication Protocol (EAP) method that is based on the Internet Key Exchange (IKEv2) protocol.  EAP-IKEv2 provides mutual authentication and session key establishment between an EAP peer and an EAP server.  It supports authentication techniques that are based on passwords, high-entropy shared keys, and public key certificates.  EAP-IKEv2 further provides support for cryptographic ciphersuite negotiation, hash function agility, identity confidentiality (in certain modes of operation), fragmentation, and an optional &quot;fast reconnect&quot; mode.  This memo defines an Experimental Protocol for the Internet community.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-tschofenig-eap-ikev2-15" />
   
</reference>
