[BOOK][B] Host identity protocol (HIP): towards the secure mobile internet

A Gurtov - 2008 - books.google.com
“Within the set of many identifier-locator separation designs for the Internet, HIP has
progressed further than anything else we have so far. It is time to see what HIP can do in …

Hi3: An efficient and secure networking architecture for mobile hosts

A Gurtov, D Korzun, A Lukyanenko… - Computer Communications, 2008 - Elsevier
The Host Identity Indirection Infrastructure (Hi3) is a networking architecture for mobile hosts,
derived from the Internet Indirection Infrastructure (i3) and the Host Identity Protocol (HIP) …

Fuego: Experiences with mobile data communication and synchronization

S Tarkoma, J Kangasharju, T Lindholm… - 2006 IEEE 17th …, 2006 - ieeexplore.ieee.org
In this paper, we present a summary of our experiences with mobile middleware research in
the four-year Fuego Core project. The presented work focuses on data communication and …

Cryptographic key containers on a USB token

T Acar, CM Ellison - US Patent 8,588,421, 2013 - Google Patents
BACKGROUND It is not uncommon to protect data via cryptography. Typi cally,
cryptographic keys are used to encrypt and decrypt the data. Because the cryptographic …

[PDF][PDF] State of the art review of distributed event systems

S Tarkoma, K Raatikainen - Helsinki Institue for Information Technology, 2006 - arquivo.pt
This document presents an overview of event systems and distributed event frameworks with
an emphasis on the special requirements presented by mobile computing. An event-based …

Adoption barriers of network layer protocols: The case of host identity protocol

T Levä, M Komu, A Keränen, S Luukkainen - Computer networks, 2013 - Elsevier
With increasing societal dependence on the Internet and new application areas emerging,
the need for securing communications and identifying communication partners is expected …

Black boxes: making ends meet in data driven networking

S Tarkoma, D Trossen, M Särelä - … of the 3rd international workshop on …, 2008 - dl.acm.org
In this paper, we consider issues pertaining to end-to-end communications and mobility of
network end-points in a network where the forwarding is based on data and interest. We …

Leap-of-faith security is enough for ip mobility

M Komu, J Lindqvist - 2009 6th IEEE Consumer …, 2009 - ieeexplore.ieee.org
Host mobility presents a challenge for security protocols. For example, many proposals exist
for integrating IPsec to mobile IP. However, the existing approaches are cumbersome to …

[PDF][PDF] LHIP–Lightweight Authentication for the Host Identity Protocol

TM Heer - Master's thesis, University of Tübingen, 2006 - Citeseer
The ubiquity of truly mobile appliances such as Wi-Fi-enabled mobile phones, PDAs, and
Internet web pads stands in stark contrast to the lack of mobility support in today's …

[PDF][PDF] XML messaging for mobile devices

J Kangasharju - 2008 - researchgate.net
In recent years, XML has been widely adopted as a universal format for structured data. A
variety of XML-based systems have emerged, most prominently SOAP for Web services …