Methods and protocols for secure key negotiation using IKE | IEEE Journals & Magazine | IEEE Xplore