Host Identity Protocol

Results: 20



#Item
1Host Identity Protocol Extensions for the Traversal of Network Address Translators Vivien Schmitt Master Thesis May 2006

Host Identity Protocol Extensions for the Traversal of Network Address Translators Vivien Schmitt Master Thesis May 2006

Add to Reading List

Source URL: eggert.org

Language: English - Date: 2011-09-26 06:39:55
    2JUHA KORHONEN HOST IDENTITY PROTOCOL (HIP) IMPLEMENTATION IN THE SYMBIAN ENVIRONMENT Master of Science Thesis  Examiner: Prof. Jarmo Harju

    JUHA KORHONEN HOST IDENTITY PROTOCOL (HIP) IMPLEMENTATION IN THE SYMBIAN ENVIRONMENT Master of Science Thesis Examiner: Prof. Jarmo Harju

    Add to Reading List

    Source URL: eggert.org

    Language: English - Date: 2011-09-26 06:39:55
      3IP-Layer Soft Handoff Implementation in ILNP Ditchaphong Phoomikiattisak Saleem N. Bhatti  School of Computer Science

      IP-Layer Soft Handoff Implementation in ILNP Ditchaphong Phoomikiattisak Saleem N. Bhatti School of Computer Science

      Add to Reading List

      Source URL: saleem.host.cs.st-andrews.ac.uk

      Language: English - Date: 2014-09-23 12:32:06
      4IEEE MILCOM 2014, 06-08 Oct 2014, Baltimore, MD, USA (with corrections to the camera-ready copy on IEEExplore) Fast, Secure Failover for IP Saleem N. Bhatti & Ditchaphong Phoomikiattisak

      IEEE MILCOM 2014, 06-08 Oct 2014, Baltimore, MD, USA (with corrections to the camera-ready copy on IEEExplore) Fast, Secure Failover for IP Saleem N. Bhatti & Ditchaphong Phoomikiattisak

      Add to Reading List

      Source URL: saleem.host.cs.st-andrews.ac.uk

      Language: English - Date: 2015-08-20 03:26:02
      5Identity and Location: implications for Security, Privacy and Resilience Saleem	Bha)	 School	of	Computer	Science	 University	of	St	Andrews

      Identity and Location: implications for Security, Privacy and Resilience Saleem Bha) School of Computer Science University of St Andrews

      Add to Reading List

      Source URL: saleem.host.cs.st-andrews.ac.uk

      Language: English - Date: 2016-04-07 10:42:21
      6Primer on Host Identity Protocol (HIP) A Game Changer in IP Communications Dr. Andrei Gurtov, Aalto University, Finland Andrei Gurtov received his M.Scand Ph.Ddegrees in Computer Science from the Univers

      Primer on Host Identity Protocol (HIP) A Game Changer in IP Communications Dr. Andrei Gurtov, Aalto University, Finland Andrei Gurtov received his M.Scand Ph.Ddegrees in Computer Science from the Univers

      Add to Reading List

      Source URL: www.temperednetworks.com

      Language: English - Date: 2015-09-27 22:19:26
        7Defense-in-Depth Security for Enterprise IoT Addressing the fundamental vulnerabilities of IP communications “Host Identity Protocol is recognized by the Internet Engineering Task Force (IETF) community as the next pos

        Defense-in-Depth Security for Enterprise IoT Addressing the fundamental vulnerabilities of IP communications “Host Identity Protocol is recognized by the Internet Engineering Task Force (IETF) community as the next pos

        Add to Reading List

        Source URL: www.temperednetworks.com

        Language: English - Date: 2016-03-21 11:51:52
          8Primer on Host Identity Protocol (HIP) A Game Changer in IP Communications Dr. Andrei Gurtov, Aalto University, Finland Andrei Gurtov received his M.Scand Ph.Ddegrees in Computer Science from the Univers

          Primer on Host Identity Protocol (HIP) A Game Changer in IP Communications Dr. Andrei Gurtov, Aalto University, Finland Andrei Gurtov received his M.Scand Ph.Ddegrees in Computer Science from the Univers

          Add to Reading List

          Source URL: www.temperednetworks.com

          Language: English - Date: 2015-09-27 22:19:26
            9A Secure Multicast Architecture of Using Host Identity Protocol

            A Secure Multicast Architecture of Using Host Identity Protocol

            Add to Reading List

            Source URL: www.eei.edu.cn

            Language: English - Date: 2010-10-17 23:11:04
            10Network Identity Appliances PLATFORMS Data Sheet  SECURITY-HARDENED APPLIANCES FOR IDENTITY-DRIVEN NETWORKS

            Network Identity Appliances PLATFORMS Data Sheet SECURITY-HARDENED APPLIANCES FOR IDENTITY-DRIVEN NETWORKS

            Add to Reading List

            Source URL: www.andovercg.com

            Language: English