Host identity protocol (HIP): Connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks

P Nikander, A Gurtov… - … Surveys & Tutorials, 2010 - ieeexplore.ieee.org
The Host Identity Protocol (HIP) is an inter-networking architecture and an associated set of
protocols, developed at the IETF since 1999 and reaching their first stable version in 2007 …

Research on network security of VPN technology

Z Xu, J Ni - … Conference on Information Science and Education …, 2020 - ieeexplore.ieee.org
with the wide adoption of Internet, it has become a tool that we can use to work and learn at
any time anywhere as we wish. Internet has made it possible to have video conferences …

SIP APIs for voice and video communications on the web

C Davids, A Johnston, K Singh, H Sinnreich… - Proceedings of the 5th …, 2011 - dl.acm.org
Existing standard protocols for the web and Internet telephony fail to deliver real-time
interactive communication from within a web browser. In particular, the client-server web …

NTMobile における通信接続性の確立手法と実装

鈴木秀和, 上醉尾一真, 水谷智大, 西尾拓也… - 情報処理学会 …, 2013 - ipsj.ixsq.nii.ac.jp
論文抄録 モバイルインターネット環境の普及にともない, ユーザが通信中に様々なネットワークへ
移動することが考えられる. 本論文では, IPv4 ネットワークにおけるグローバルアドレスや …

Challenge and solutions of NAT traversal for ubiquitous and pervasive applications on the Internet

YC Chen, WK Jia - Journal of Systems and Software, 2009 - Elsevier
Network Address Translator (NAT) has brought up many changes and opportunities to the
Internet. How do the ubiquitous and pervasive applications coexist with NAT and …

Adoption barriers of network layer protocols: The case of host identity protocol

T Levä, M Komu, A Keränen, S Luukkainen - Computer networks, 2013 - Elsevier
With increasing societal dependence on the Internet and new application areas emerging,
the need for securing communications and identifying communication partners is expected …

[BOOK][B] Personal networks: Wireless networking for personal devices

M Jacobsson, I Niemegeers, SH De Groot - 2011 - books.google.com
Written by experts in the field, this book describes the Personal Network architecture and its
various components This book focuses on networking and security aspects of Personal …

NTMobile における相互接続性の確立手法と実装

鈴木秀和, 水谷智大, 西尾拓也, 内藤克浩… - マルチメディア, 分散 …, 2011 - ipsj.ixsq.nii.ac.jp
論文抄録 IPv4/IPv6 ネットワークが混在した環境において, ネットワークのアドレス空間/アドレス体系
に依存することなく, ノードの相互接続性の確立と移動透過性を実現する NTMobile を提案する …

Enterprise network packet filtering for mobile cryptographic identities

J Lindqvist, E Vehmersalo, M Komu… - Emergent Trends in …, 2012 - igi-global.com
Firewalls are an essential component of the Internet and enterprise network security policy
enforcement today. The configurations of enterprise firewalls are typically rather static. Even …

[PDF][PDF] A consolidated namespace for network applications, developers, administrators and users

M Komu - 2012 - aaltodoc.aalto.fi
The current Internet is founded on the TCP/IP architecture that was originally designed
around machines rather than humans. In the original architecture, computers were always …