DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Host Identity Protocol
Host Identity Protocol
Host Identity Protocol (HIP) •Overlays (I3 and Hi3) •Summary Introductionintroduction
Host Identity Protocol
Primer on Host Identity Protocol
RFC 9063: Host Identity Protocol Architecture
Guidelines for the Secure Deployment of Ipv6
A Security Framework for the Internet of Things in the Future Internet Architecture
Fast Authentication and Trust-Based Access Control in Heterogeneous Wireless Networks Maryna Komarova
Using Software-Defined Networking to Improve Campus, Transport and Future Internet Architectures" (2015)
Ment Protocols and Their Im- Plementations
Experimental Experience with Host Identity Protocol (HIP) Nahla Abid, Maryline Laurent, Hakima Chaouchi
Introduction to Host Identity Protocol (Hip) and Its
Route Optimization in Network Mobility: Solutions, Classification, Comparison, and Future Research Directions Abu Zafar M
Trusted Hosts in Host Identity Protocol (HIP)
Locator ID Separation for Mobility Management in the New Generation Network∗ Ved P
Host Identity Protocol Proxy
International Journal for Scientific Research & Development
Introduction to Host Identity Protocol (Hip) and Its
Performance Analysis of Proxy Based Encrypted Communication in Iot Environments
Top View
TNC IF-MAP Metadata for Industrial Control System Security
Rendezvous Mechanisms in Host Identity Protocol
Embedding Identity in Mobile Environments
Internet Research Task Force H. Baba Internet-Draft the University of Tokyo Intended Status: Informational Y
T-110.5140 Network Application Frameworks and XML Summary and Conclusions 29.3.2010 Tancred Lindholm, Sasu Tarkoma the Lecture About Everything
(CSA) Protocol Suite for Defense Against Dos Attacks
Orthus Authentication Protocol: Background Services
Usable Security Management with Host Identity Protocol
Installation and Evaluation of a HIP Infrastructure
Synthesis of Attack Actions Using Model Checking for the Verification of Security Protocols
Session Layer Protocols: Dialog Management, Synchronization
Next Generation Kernel Network Tunnel
An Identifier-Locator Approach to Host Multihoming
NISTIR 7581, System and Network Security Acronyms and Abbreviations
Introduction to the Internet Area
Risk Analysis of Host Identity Protocol
Lightweight Host and User Authentication Protocol for All-IP Telecom Networks
Federated Identity and Access Management for the Internet of Things
Specification of the Problems in the High-Level Specification Language
Securing the Internet of Things: a Standardization Perspective Sye Loong Keoh, Sandeep S
Apply HIP to Handover Procedures in Hybrid Access Mode LTE Femtocells
En-Ist-070-02
Suresh Krishnan (Internet Area Director) What Do We Want to Cover
Secure Communication in Internet of Things
Integrating RFID with IP Host Identities
Through Introducing Identification Packet and Udt -Authentication Option Field : a Characterization
University of Oklahoma Graduate College
Layer 2 Security Inter-Layering in Networks
Preparation of Papers in Two-Column Format
Fast, Secure Failover for IP
Compact Extensible Authentication Protocol for the Internet of Things: Enabling Scalable and Efficient Security Commissioning
Dissertation in PDF Format
Mobility As a First Class Function
TCG TNC IF-MAP Binding for SOAP Version
Download File
Federated Identity and Access Management For
Technical Glossary
Plano De Segurança Para Autenticação De Dados Em Redes Orientadas À Informação
A Brief Review on MQTT's Security Issues Within the Internet of Things
End-Host Authentication and Authorization for Middleboxes
Mobilenat: a New Technique for Mobility Across Heterogeneous Address Spaces
(HIP) Simulation Framework for INET/Omnet++ László Bokor Szabolcs Nováczki László Tamás Zeke Gábor Jeney
Integrating User Identity Management Systems with the Host Identity Protocol
Identity-Based Internet Protocol Network
Federated Identity and Access Management for the Internet of Things
A New Authentication Method Based on Cryptographic Identifiers Cgas Nahla Abid, Maryline Laurent
Integrating Security and Privacy Protection Into a Mobility-Centric Internet Architecture
Internet Security Protocols: Specification and Modeling