Host identity protocol (HIP): Connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks
The Host Identity Protocol (HIP) is an inter-networking architecture and an associated set of
protocols, developed at the IETF since 1999 and reaching their first stable version in 2007 …
protocols, developed at the IETF since 1999 and reaching their first stable version in 2007 …
Research on network security of VPN technology
Z Xu, J Ni - … Conference on Information Science and Education …, 2020 - ieeexplore.ieee.org
with the wide adoption of Internet, it has become a tool that we can use to work and learn at
any time anywhere as we wish. Internet has made it possible to have video conferences …
any time anywhere as we wish. Internet has made it possible to have video conferences …
SIP APIs for voice and video communications on the web
C Davids, A Johnston, K Singh, H Sinnreich… - Proceedings of the 5th …, 2011 - dl.acm.org
Existing standard protocols for the web and Internet telephony fail to deliver real-time
interactive communication from within a web browser. In particular, the client-server web …
interactive communication from within a web browser. In particular, the client-server web …
NTMobile における通信接続性の確立手法と実装
鈴木秀和, 上醉尾一真, 水谷智大, 西尾拓也… - 情報処理学会 …, 2013 - ipsj.ixsq.nii.ac.jp
論文抄録 モバイルインターネット環境の普及にともない, ユーザが通信中に様々なネットワークへ
移動することが考えられる. 本論文では, IPv4 ネットワークにおけるグローバルアドレスや …
移動することが考えられる. 本論文では, IPv4 ネットワークにおけるグローバルアドレスや …
Challenge and solutions of NAT traversal for ubiquitous and pervasive applications on the Internet
YC Chen, WK Jia - Journal of Systems and Software, 2009 - Elsevier
Network Address Translator (NAT) has brought up many changes and opportunities to the
Internet. How do the ubiquitous and pervasive applications coexist with NAT and …
Internet. How do the ubiquitous and pervasive applications coexist with NAT and …
Adoption barriers of network layer protocols: The case of host identity protocol
With increasing societal dependence on the Internet and new application areas emerging,
the need for securing communications and identifying communication partners is expected …
the need for securing communications and identifying communication partners is expected …
[BOOK][B] Personal networks: Wireless networking for personal devices
M Jacobsson, I Niemegeers, SH De Groot - 2011 - books.google.com
Written by experts in the field, this book describes the Personal Network architecture and its
various components This book focuses on networking and security aspects of Personal …
various components This book focuses on networking and security aspects of Personal …
NTMobile における相互接続性の確立手法と実装
鈴木秀和, 水谷智大, 西尾拓也, 内藤克浩… - マルチメディア, 分散 …, 2011 - ipsj.ixsq.nii.ac.jp
論文抄録 IPv4/IPv6 ネットワークが混在した環境において, ネットワークのアドレス空間/アドレス体系
に依存することなく, ノードの相互接続性の確立と移動透過性を実現する NTMobile を提案する …
に依存することなく, ノードの相互接続性の確立と移動透過性を実現する NTMobile を提案する …
Enterprise network packet filtering for mobile cryptographic identities
Firewalls are an essential component of the Internet and enterprise network security policy
enforcement today. The configurations of enterprise firewalls are typically rather static. Even …
enforcement today. The configurations of enterprise firewalls are typically rather static. Even …
[PDF][PDF] A consolidated namespace for network applications, developers, administrators and users
M Komu - 2012 - aaltodoc.aalto.fi
The current Internet is founded on the TCP/IP architecture that was originally designed
around machines rather than humans. In the original architecture, computers were always …
around machines rather than humans. In the original architecture, computers were always …