-
1
-
-
44549087754
-
-
D. Adkins, K. Lakshminarayanan, A. Perrig, I. Stoica, Towards a more functional and secure network infrastructure, Technical Report UCB/CSD-03-1242, University of California at Berkeley, 2003.
-
D. Adkins, K. Lakshminarayanan, A. Perrig, I. Stoica, Towards a more functional and secure network infrastructure, Technical Report UCB/CSD-03-1242, University of California at Berkeley, 2003.
-
-
-
-
2
-
-
21844450653
-
-
H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, M. Walfish, A layered naming architecture for the Internet, in: Proceedings of the ACM SIGCOMM'04, August, 2004, pp. 343-352.
-
H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, M. Walfish, A layered naming architecture for the Internet, in: Proceedings of the ACM SIGCOMM'04, August, 2004, pp. 343-352.
-
-
-
-
3
-
-
44549084789
-
-
C. Candolin, P. Nikander, IPv6 source addresses considered harmful, in: Proceedings of the Sixth Nordic Workshop on Secure IT Systems, November, 2001.
-
C. Candolin, P. Nikander, IPv6 source addresses considered harmful, in: Proceedings of the Sixth Nordic Workshop on Secure IT Systems, November, 2001.
-
-
-
-
4
-
-
33845204659
-
FARA: reorganizing the addressing architecture
-
Clark D., Braden R., Falk A., and Pingali V. FARA: reorganizing the addressing architecture. ACM Computer Communication Review 33 4 (2003) 313-321
-
(2003)
ACM Computer Communication Review
, vol.33
, Issue.4
, pp. 313-321
-
-
Clark, D.1
Braden, R.2
Falk, A.3
Pingali, V.4
-
5
-
-
44549087057
-
-
D. Crocker, Multiple Address service for transport (MAST): an extended proposal: draft-crocker-mast-01.txt, September, 2003, Work in progress, Expired in February, 2004.
-
D. Crocker, Multiple Address service for transport (MAST): an extended proposal: draft-crocker-mast-01.txt, September, 2003, Work in progress, Expired in February, 2004.
-
-
-
-
6
-
-
44549087809
-
-
J. Eriksson, M. Faloutsos, S. Krishnamurthy, PeerNet: pushing peer-to-peer down the stack, in: Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS'03), Springer-Verlag, Berkeley, CA, USA, February, 2003.
-
J. Eriksson, M. Faloutsos, S. Krishnamurthy, PeerNet: pushing peer-to-peer down the stack, in: Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS'03), Springer-Verlag, Berkeley, CA, USA, February, 2003.
-
-
-
-
7
-
-
44549085692
-
-
P. Francis, IPNL: a NAT-extended Internet architecture, in: Proceedings of the ACM SIGCOMM'01, San Diego, CA, USA, August, 2001.
-
P. Francis, IPNL: a NAT-extended Internet architecture, in: Proceedings of the ACM SIGCOMM'01, San Diego, CA, USA, August, 2001.
-
-
-
-
8
-
-
44549084144
-
-
A. Gurtov, D. Korzun, P. Nikander, Hi3: an efficient and secure networking architecture for mobile hosts, Technical Report TR-2005-2, HIIT, June, 2005.
-
A. Gurtov, D. Korzun, P. Nikander, Hi3: an efficient and secure networking architecture for mobile hosts, Technical Report TR-2005-2, HIIT, June, 2005.
-
-
-
-
9
-
-
84907687250
-
-
T.R. Henderson, J.M. Ahrenholz, J.H. Kim, Experience with the Host Identity Protocol for secure host mobility and multihoming, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC'03), March, 2003.
-
T.R. Henderson, J.M. Ahrenholz, J.H. Kim, Experience with the Host Identity Protocol for secure host mobility and multihoming, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC'03), March, 2003.
-
-
-
-
10
-
-
44549085590
-
-
M. Ishiyama, M. Kunishi, F. Teraoka, An analysis of mobility handling in LIN6, in: Proceedings of the International Symposium on Wireless Personal Multimedia Communications (WPMC'01), August, 2001.
-
M. Ishiyama, M. Kunishi, F. Teraoka, An analysis of mobility handling in LIN6, in: Proceedings of the International Symposium on Wireless Personal Multimedia Communications (WPMC'01), August, 2001.
-
-
-
-
11
-
-
44549083780
-
-
P. Jokela, P. Nikander, J. Melen, J. Ylitalo, J. Wall, Host Identity Protocol: achieving IPv4-IPv6 handovers without tunneling, in: Proceedings of the Evolute workshop 2003: "Beyond 3G Evolution of Systems and Services", November, 2003.
-
P. Jokela, P. Nikander, J. Melen, J. Ylitalo, J. Wall, Host Identity Protocol: achieving IPv4-IPv6 handovers without tunneling, in: Proceedings of the Evolute workshop 2003: "Beyond 3G Evolution of Systems and Services", November, 2003.
-
-
-
-
12
-
-
33750926061
-
-
M. Komu, S. Tarkoma, J. Kangasharju, A. Gurtov, Applying a cryptographic namespace to applications, in: Proceedings of the first ACM Workshop on Dynamic Interconnection of Networks (DIN 2005), ACM Press, Cologne, Germany, September, 2005.
-
M. Komu, S. Tarkoma, J. Kangasharju, A. Gurtov, Applying a cryptographic namespace to applications, in: Proceedings of the first ACM Workshop on Dynamic Interconnection of Networks (DIN 2005), ACM Press, Cologne, Germany, September, 2005.
-
-
-
-
13
-
-
33750349061
-
On scalability properties of the Hi3 control plane
-
Korzun D., and Gurtov A. On scalability properties of the Hi3 control plane. Computer Communications 29 17 (2006) 3591-3601
-
(2006)
Computer Communications
, vol.29
, Issue.17
, pp. 3591-3601
-
-
Korzun, D.1
Gurtov, A.2
-
14
-
-
44549083833
-
-
J. Laganier, L. Eggert, Host Identity Protocol (HIP) rendezvous extension: draft-ietf-hip-rvs-05, June, 2006, Work in progress, Expires in December, 2006.
-
J. Laganier, L. Eggert, Host Identity Protocol (HIP) rendezvous extension: draft-ietf-hip-rvs-05, June, 2006, Work in progress, Expires in December, 2006.
-
-
-
-
15
-
-
44549083384
-
-
J. Laganier, T. Koponen, L. Eggert, Host Identity Protocol (HIP) registration extension: draft-koponen-hip-registration-02, June 2006, Work in progress.
-
J. Laganier, T. Koponen, L. Eggert, Host Identity Protocol (HIP) registration extension: draft-koponen-hip-registration-02, June 2006, Work in progress.
-
-
-
-
16
-
-
44549086367
-
-
K. Lakshminarayanan, D. Adkins, A. Perrig, I. Stoica, On securing forwarding infrastructures: protecting the data plane from an untrusted control plane, 2005, unpublished manuscript.
-
K. Lakshminarayanan, D. Adkins, A. Perrig, I. Stoica, On securing forwarding infrastructures: protecting the data plane from an untrusted control plane, 2005, unpublished manuscript.
-
-
-
-
17
-
-
23944488798
-
-
J. Li, J. Stribling, T.M. Gil, R. Morris, M.F. Kaashoek, Comparing the performance of distributed hash tables under churn, in: Proceedings of the Third International Workshop on Peer-to-Peer Systems, 2004, pp. 87-99.
-
J. Li, J. Stribling, T.M. Gil, R. Morris, M.F. Kaashoek, Comparing the performance of distributed hash tables under churn, in: Proceedings of the Third International Workshop on Peer-to-Peer Systems, 2004, pp. 87-99.
-
-
-
-
18
-
-
44549086563
-
-
D. Liben-Nowell, H. Balakrishnan, D. Karger, Observations on the dynamic evolution of peer-to-peer networks, in: Proceedings of the First Workshop on P2P Systems and Technologies, Cambridge, MA, March, 2002.
-
D. Liben-Nowell, H. Balakrishnan, D. Karger, Observations on the dynamic evolution of peer-to-peer networks, in: Proceedings of the First Workshop on P2P Systems and Technologies, Cambridge, MA, March, 2002.
-
-
-
-
19
-
-
44549083085
-
-
R. Moskowitz, P. Nikander, Host Identity Protocol architecture, RFC 4423, IETF, May, 2006.
-
R. Moskowitz, P. Nikander, Host Identity Protocol architecture, RFC 4423, IETF, May, 2006.
-
-
-
-
20
-
-
44549087787
-
-
R. Moskowitz, P. Nikander, P. Jokela, T.R. Henderson, Host Identity Protocol: draft-ietf-hip-base-10, October, 2007, Work in progress, Expires in May, 2008.
-
R. Moskowitz, P. Nikander, P. Jokela, T.R. Henderson, Host Identity Protocol: draft-ietf-hip-base-10, October, 2007, Work in progress, Expires in May, 2008.
-
-
-
-
21
-
-
44549085219
-
-
P. Nikander, J. Arkko, Delegation of signalling rights, in Proceedings of the 10th International Workshop on Security Protocols, Springer, Cambridge, UK, April, 2002, pp. 203-212.
-
P. Nikander, J. Arkko, Delegation of signalling rights, in Proceedings of the 10th International Workshop on Security Protocols, Springer, Cambridge, UK, April, 2002, pp. 203-212.
-
-
-
-
22
-
-
44549087184
-
-
P. Nikander, J. Arkko, T. Henderson, End-host mobility and multi-homing with host identity protocol: draft-ietf-hip-mm-05, March, 2007, Work in progress, Expires September, 2007.
-
P. Nikander, J. Arkko, T. Henderson, End-host mobility and multi-homing with host identity protocol: draft-ietf-hip-mm-05, March, 2007, Work in progress, Expires September, 2007.
-
-
-
-
23
-
-
44549088020
-
-
P. Nikander, J. Arkko, B. Ohlman, Host identity indirection infrastructure (hi3), in: The Second Swedish National Computer Networking Workshop, November, 2004.
-
P. Nikander, J. Arkko, B. Ohlman, Host identity indirection infrastructure (hi3), in: The Second Swedish National Computer Networking Workshop, November, 2004.
-
-
-
-
24
-
-
44549086435
-
-
P. Nikander, H. Tschofenig, X. Fu, T. Henderson, J. Laganier, Preferred alternatives for tunnelling HIP (PATH): draft-nikander-hip-path-01.txt, Work in progress, March, 2006.
-
P. Nikander, H. Tschofenig, X. Fu, T. Henderson, J. Laganier, Preferred alternatives for tunnelling HIP (PATH): draft-nikander-hip-path-01.txt, Work in progress, March, 2006.
-
-
-
-
25
-
-
44549083963
-
-
P. Nikander, J. Ylitalo, J. Wall, Integrating security, mobility, and multi-homing in a HIP way, in: Proceedings of the Network and Distributed Systems Security Symposium (NDSS'03), San Diego, CA, USA, Internet Society, February, 2003.
-
P. Nikander, J. Ylitalo, J. Wall, Integrating security, mobility, and multi-homing in a HIP way, in: Proceedings of the Network and Distributed Systems Security Symposium (NDSS'03), San Diego, CA, USA, Internet Society, February, 2003.
-
-
-
-
26
-
-
44549087056
-
-
J. Postel, S. Crocker, A possible protocol plateau. RFC 48, April, 1970.
-
J. Postel, S. Crocker, A possible protocol plateau. RFC 48, April, 1970.
-
-
-
-
27
-
-
44549083498
-
-
J. Rosenberg, J. Weinberger, C. Huitema, R. Mahy, STUN: simple traversal of user datagram protocol (UDP) through network address translators (NATs), RFC 3489, IETF, March, 2003.
-
J. Rosenberg, J. Weinberger, C. Huitema, R. Mahy, STUN: simple traversal of user datagram protocol (UDP) through network address translators (NATs), RFC 3489, IETF, March, 2003.
-
-
-
-
28
-
-
33744901134
-
-
I. Stoica, D. Adkins, S. Zhuang, S. Shenker, S. Surana, Internet indirection infrastructure, in: Proceedings of the ACM SIGCOMM'02, Pittsburgh, PA, USA, August, 2002, pp. 73-88.
-
I. Stoica, D. Adkins, S. Zhuang, S. Shenker, S. Surana, Internet indirection infrastructure, in: Proceedings of the ACM SIGCOMM'02, Pittsburgh, PA, USA, August, 2002, pp. 73-88.
-
-
-
-
29
-
-
44549088406
-
-
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: a scalable peer-to-peer lookup service for Internet applications, in: Proceedings of the ACM SIGCOMM'01, San Diego, CA, USA, August, 2001.
-
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: a scalable peer-to-peer lookup service for Internet applications, in: Proceedings of the ACM SIGCOMM'01, San Diego, CA, USA, August, 2001.
-
-
-
-
30
-
-
44549085759
-
-
H. Tschofenig, M. Shanmugam, Traversing HIP-aware NATs and Firewalls: problem statement and requirements: draft-tschofenig-hiprg-hip-natfw-traversal-04, March, 2006.
-
H. Tschofenig, M. Shanmugam, Traversing HIP-aware NATs and Firewalls: problem statement and requirements: draft-tschofenig-hiprg-hip-natfw-traversal-04, March, 2006.
-
-
-
-
31
-
-
44549083779
-
-
M. Walfish, H. Balakrishnan, The location/identity split is useful for middleboxes, too, in: Proceedings of the Workshop on HIP and Related Architectures, November, 2004.
-
M. Walfish, H. Balakrishnan, The location/identity split is useful for middleboxes, too, in: Proceedings of the Workshop on HIP and Related Architectures, November, 2004.
-
-
-
-
32
-
-
84871284967
-
-
M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, S. Shenker, Middleboxes no longer considered harmful, in: Proceedings of the 7th USENIX Symposium on Operating System Design and Implementation (OSDI 2004), ACM Press, San Fransisco, CA, USA, December, 2004.
-
M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, S. Shenker, Middleboxes no longer considered harmful, in: Proceedings of the 7th USENIX Symposium on Operating System Design and Implementation (OSDI 2004), ACM Press, San Fransisco, CA, USA, December, 2004.
-
-
-
-
33
-
-
35048904232
-
-
J. Ylitalo, J. Melen, P. Nikander, V. Torvinen, Re-thinking security in IP based micro-mobility, in: Proceedings of 7th Information Security Conference (ISC04), September, 2004.
-
J. Ylitalo, J. Melen, P. Nikander, V. Torvinen, Re-thinking security in IP based micro-mobility, in: Proceedings of 7th Information Security Conference (ISC04), September, 2004.
-
-
-
-
34
-
-
44549088854
-
-
J. Ylitalo, P. Nikander, BLIND: a complete identity protection framework for end-points, in: Proceedings of the Twelfth International Workshop on Security Protocols, April, 2004.
-
J. Ylitalo, P. Nikander, BLIND: a complete identity protection framework for end-points, in: Proceedings of the Twelfth International Workshop on Security Protocols, April, 2004.
-
-
-
-
35
-
-
44549083011
-
-
J. Ylitalo, P. Nikander, A new name space for end-points: implementing secure mobility and multi-homing across the two versions of IP, in: Proceedings of the fifth European Wireless Conference, Mobile and Wireless Systems beyond 3G (EW2004), February, 2004, pp. 435-441.
-
J. Ylitalo, P. Nikander, A new name space for end-points: implementing secure mobility and multi-homing across the two versions of IP, in: Proceedings of the fifth European Wireless Conference, Mobile and Wireless Systems beyond 3G (EW2004), February, 2004, pp. 435-441.
-
-
-
|