Sold Out
Book Categories |
Foreword Jari Arkko Arkko, Jari
Foreword David Hutchison Hutchison, David
Pt. I Introduction 1
1 Overview 3
2 Introduction to network security 11
Pt. II The Host Identity Protocol 43
3 Architectural overview 45
4 Base protocol 51
5 Main extensions 67
6 Advanced extensions 85
7 Performance measurements 105
8 Lightweight HIP 117
Pt. III Infrastructure Support 161
9 Middlebox traversal 163
10 Name resolution 181
11 Micromobility 203
12 Communication privacy 217
Pt. IV Applications 225
13 Possible HIP applications 227
14 Application interface 243
15 Integrating HIP with other protocols 255
App. A Installing and using HIP 279
Bibliography 285
Index 291
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionHost Identity Protocol (HIP): Towards the Secure Mobile Internet
X
This Item is in Your InventoryHost Identity Protocol (HIP): Towards the Secure Mobile Internet
X
You must be logged in to review the productsX
X
X
Add Host Identity Protocol (HIP): Towards the Secure Mobile Internet, Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world n, Host Identity Protocol (HIP): Towards the Secure Mobile Internet to the inventory that you are selling on WonderClubX
X
Add Host Identity Protocol (HIP): Towards the Secure Mobile Internet, Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world n, Host Identity Protocol (HIP): Towards the Secure Mobile Internet to your collection on WonderClub |