Search

Your search keyword '"Gurtov, A."' showing total 47 results

Search Constraints

Start Over You searched for: Author "Gurtov, A." Remove constraint Author: "Gurtov, A." Topic host identity protocol Remove constraint Topic: host identity protocol
47 results on '"Gurtov, A."'

Search Results

1. CR-Chord

4. Traversing Middleboxes with the Host Identity Protocol

5. IoT and HIP's Opportunistic Mode

6. Secure communication channel architecture for Software Defined Mobile Networks

7. Novel secure VPN architectures for LTE backhaul networks

8. Secure Hierarchical VPLS Architecture for Provider Provisioned Networks

9. Hardening Opportunistic HIP

10. CHIP: collaborative host identity protocol with efficient key establishment for constrained devices in Internet of Things

11. Performance evaluation of current and emerging authentication schemes for future 3GPP network architectures

12. Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core

13. Analysis of deployment challenges of Host Identity Protocol

14. CHIP:collaborative host identity protocol with efficient key establishment for constrained devices in internet of things

15. Secure and Efficient IPv4/IPv6 Handovers Using Host-Based Identifier-Locator Split

16. Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks

17. Hi3: An efficient and secure networking architecture for mobile hosts

18. Performance and security evaluation of intra-vehicular communication architecture

19. On scalability properties of the Hi3 control plane

20. Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-based Approach

21. Securing the control channel of software-defined mobile networks

22. Security for medical sensor networks in mobile health systems

23. Secure lightweight protocols for medical device monitoring

24. Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario

25. Secure hierarchical Virtual Private LAN Services for provider provisioned networks

26. Lightweight authentication and key management on 802.11 with Elliptic Curve Cryptography

27. A scalable and secure VPLS architecture for provider provisioned networks

28. Host identity protocol (HIP): an overview

29. Secure and Multihomed Vehicular Femtocells

30. Secure Resolution of End-Host Identifiers for Mobile Clients

31. On application of Host Identity Protocol in wireless sensor networks

32. Elliptic Curve Cryptography (ECC) for Host Identity Protocol (HIP)

33. Distributed user authentication in wireless LANs

34. Performance of Host Identity Protocol on Symbian OS

35. Usable security management with host identity protocol

36. Secure Multipath Transport For Legacy Internet Applications

37. Filtering SPAM in P2PSIP Communities with Web of Trust

38. SAVAH: Source Address Validation with Host Identity Protocol

39. Host Identity Protocol (HIP)

40. Performance of host identity protocol on lightweight hardware

41. Lightweight host and user authentication protocol for All-IP telecom networks.

42. Analysis of the HIP base exchange protocol

43. Applying a Cryptographic Namespace to Applications

44. Performance Analysis of HIP Diet Exchange for WSN Security Establishment

45. Lightweight authentication and key management of wireless sensor networks for Internet of things

46. Enhancing security and scalability of Virtual Private LAN Services

47. Enhanced communication security and mobility management in small-cell networks

Catalog

Books, media, physical & digital resources