-
1
-
-
77956088656
-
General requirements for ID/locator separation in NGN
-
ITU-T ITU-T Y.2015 (Y.ipsplit), Feb. 6
-
ITU-T, "General requirements for ID/locator separation in NGN," ITU-T Draft Recommendation, ITU-T Y.2015 (Y.ipsplit), Feb. 6, 2009.
-
(2009)
ITU-T Draft Recommendation
-
-
-
2
-
-
70049087590
-
UFA: Ultra flat architecture for high bitrate services in mobile networks
-
Cannes, France, Sep. 15-18
-
K. Daoud, P. Herbelin, and N. Crespi, "UFA: Ultra Flat Architecture for high bitrate services in mobile networks," in Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, Cannes, France, Sep. 15-18, 2008, pp. 1-6.
-
(2008)
Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008
, pp. 1-6
-
-
Daoud, K.1
Herbelin, P.2
Crespi, N.3
-
3
-
-
67649710033
-
One-node based mobile architecture for better QoS control
-
Dubai, UAE, Nov. 24-27
-
-, "One-Node Based Mobile architecture for better QoS control," in Proceedings of the 1st IFIP Wireless Day Conference 2008, Dubai, UAE, Nov. 24-27, 2008, pp. 1-5.
-
(2008)
Proceedings of the 1st IFIP Wireless Day Conference 2008
, pp. 1-5
-
-
-
4
-
-
85089791392
-
Performance and implementation of UFA: A SIP-based ultra flat mobile network architecture
-
Tokyo, Japan, Sep. 13-16
-
K. Daoud et al., "Performance and Implementation of UFA: a SIP-based Ultra Flat Mobile Network Architecture," in Proceedings of PIMRC 2009, Tokyo, Japan, Sep. 13-16, 2009, pp. 1-6.
-
(2009)
Proceedings of PIMRC 2009
, pp. 1-6
-
-
Daoud, K.1
-
5
-
-
0003593249
-
IEEE standard for local and metropolitan area networks - Part 21: Media independent handover
-
IEEE Jan.
-
IEEE, "IEEE Standard for Local and metropolitan area networks - Part 21: Media Independent Handover," IEEE Std 802.21-2008, Jan. 2009.
-
(2009)
IEEE Std 802.21-2008
-
-
-
6
-
-
67649883905
-
Host identity protocol
-
Apr.
-
R. Moskowitz et al., "Host Identity Protocol," RFC 5201, Apr. 2008.
-
(2008)
RFC 5201
-
-
Moskowitz, R.1
-
7
-
-
44549084308
-
Hi3: An efficient and secure networking architecture for mobile hosts
-
A. Gurtov et al., "Hi3: An efficient and secure networking architecture for mobile hosts," Journal of Computer Communications, vol. 31, no. 10, pp. 2457-2467, 2008.
-
(2008)
Journal of Computer Communications
, vol.31
, Issue.10
, pp. 2457-2467
-
-
Gurtov, A.1
-
8
-
-
77956083748
-
Host identity protocol (HIP) registration extension
-
Apr.
-
J. Laganier, T. Koponen, and L. Eggert, "Host Identity Protocol (HIP) Registration Extension," RFC 5203, Apr. 2008.
-
(2008)
RFC 5203
-
-
Laganier, J.1
Koponen, T.2
Eggert, L.3
-
9
-
-
70350444226
-
Host identity protocol (HIP) rendezvous extension
-
Apr.
-
J. Laganier and L. Eggert, "Host Identity Protocol (HIP) Rendezvous Extension," RFC 5204, Apr. 2008.
-
(2008)
RFC 5204
-
-
Laganier, J.1
Eggert, L.2
-
10
-
-
44949172946
-
HIP based approach for configuration provisioning
-
Helsinki, Finland, Sep. 11-14
-
S. Heikkinen and H. Tschofenig, "HIP based Approach for Configuration Provisioning," in Proceedings of the IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'06), Helsinki, Finland, Sep. 11-14, 2006, pp. 1-5.
-
(2006)
Proceedings of the IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'06)
, pp. 1-5
-
-
Heikkinen, S.1
Tschofenig, H.2
-
11
-
-
70649099948
-
HIP DHT interface
-
Nov.
-
J. Ahrenholz, "HIP DHT Interface," IETF Draft, Nov. 2009.
-
(2009)
IETF Draft
-
-
Ahrenholz, J.1
-
12
-
-
79959543468
-
Peer-to-peer name service (P2PNS)
-
Nov.
-
I. Baumgart, "Peer-to-Peer Name Service (P2PNS)," IETF Draft, Nov. 2007.
-
(2007)
IETF Draft
-
-
Baumgart, I.1
-
13
-
-
77956081133
-
HIP BONE: Host identity protocol (HIP) based overlay networking
-
Jan.
-
G. Camarillo et al., "HIP BONE: Host Identity Protocol (HIP) Based Overlay Networking," IETF Draft, Jan. 2010.
-
(2010)
IETF Draft
-
-
Camarillo, G.1
-
14
-
-
77956070050
-
A bound end-to-end tunnel (BEET) mode for ESP
-
Aug.
-
P. Nikander and J. Melen, "A Bound End-to-End Tunnel (BEET) mode for ESP," IETF Draft, Aug. 2008.
-
(2008)
IETF Draft
-
-
Nikander, P.1
Melen, J.2
-
15
-
-
33847257900
-
SPINAT: Integrating IPsec into overlay routing
-
Athens, Greece, Sep. 5-9
-
J. Ylitalo, P. Salmela, and H. Tschofenig, "SPINAT: Integrating IPsec into Overlay Routing," in Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm'05), Athens, Greece, Sep. 5-9, 2005, pp. 315-326.
-
(2005)
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm'05)
, pp. 315-326
-
-
Ylitalo, J.1
Salmela, P.2
Tschofenig, H.3
-
16
-
-
28044443752
-
Context transfer protocol (CXTP)
-
Jul.
-
J. Loughney, M. Nakhjiri, C. Perkins, and R. Koodli, "Context Transfer Protocol (CXTP)," RFC 4067, Jul. 2005.
-
(2005)
RFC 4067
-
-
Loughney, J.1
Nakhjiri, M.2
Perkins, C.3
Koodli, R.4
-
17
-
-
63749093429
-
An application of the context transfer protocol: IPsec in a IPv6 mobility environment
-
F. Allard and J.-M. Bonnin, "An application of the context transfer protocol: IPsec in a IPv6 mobility environment," International Journal of Communication Networks and Distributed Systems, vol. 1, no. 1, pp. 110-126, 2008.
-
(2008)
International Journal of Communication Networks and Distributed Systems
, vol.1
, Issue.1
, pp. 110-126
-
-
Allard, F.1
Bonnin, J.-M.2
-
18
-
-
35048896554
-
Delegation of signalling rights
-
B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, Eds. Springer
-
P. Nikander and J. Arkko, "Delegation of Signalling Rights," in Security Protools, ser. Lecture Notes in Computer Science, B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, Eds. Springer, 2004, vol. 2845, pp. 575-586.
-
(2004)
Security Protools, Ser. Lecture Notes in Computer Science
, vol.2845
, pp. 575-586
-
-
Nikander, P.1
Arkko, J.2
-
19
-
-
77956065133
-
Host identity protocol-based mobile router (HIPMR)
-
May
-
J. Melen et al., "Host Identity Protocol-based Mobile Router (HIPMR)," IETF Draft, May 2009.
-
(2009)
IETF Draft
-
-
Melen, J.1
-
20
-
-
70449496028
-
End-host authentication and authorization for middle-boxes based on a cryptographic namespace
-
Dresden, Germany, Jun. 14-18
-
T. Heer et al., "End-host Authentication and Authorization for Middle-boxes based on a Cryptographic Namespace," in In Proceedings of the IEEE International Conference on Communications Symposium 2009 (ICC 2009), Dresden, Germany, Jun. 14-18, 2009, pp. 1-6.
-
(2009)
Proceedings of the IEEE International Conference on Communications Symposium 2009 (ICC 2009)
, pp. 1-6
-
-
Heer, T.1
-
21
-
-
77956071860
-
End-host authentication for HIP middleboxes
-
Feb.
-
-, "End-Host Authentication for HIP Middleboxes," IETF Draft, Feb. 2009.
-
(2009)
IETF Draft
-
-
-
22
-
-
77956075990
-
IEEE 802.21 mobility services framework design (MSFD)
-
Dec.
-
T. Melia et al., "IEEE 802.21 Mobility Services Framework Design (MSFD)," RFC 5677, Dec. 2009.
-
(2009)
RFC 5677
-
-
Melia, T.1
-
23
-
-
77956065879
-
Host identity protocol (HIP) domain name system (DNS) extension
-
Apr.
-
P. Nikander and J. Laganier, "Host Identity Protocol (HIP) Domain Name System (DNS) Extension," RFC 5205, Apr. 2008.
-
(2008)
RFC 5205
-
-
Nikander, P.1
Laganier, J.2
-
24
-
-
77956073084
-
3G security; wireless local area network (WLAN) interwork-ing security
-
3GPP Mar.
-
3GPP, "3G Security; Wireless Local Area Network (WLAN) interworking security," TS 33.234, Mar. 2010.
-
(2010)
TS 33.234
-
-
-
25
-
-
77953320964
-
EAP extensions for EAP re-authentication protocol (ERP)
-
Aug.
-
V. Narayanan and L. Dondeti, "EAP Extensions for EAP Re-authentication Protocol (ERP)," RFC 5296, Aug. 2008.
-
(2008)
RFC 5296
-
-
Narayanan, V.1
Dondeti, L.2
-
26
-
-
54849432299
-
Specification for the derivation of root keys from an extended master session key (EMSK)
-
Aug.
-
J. Salowey et al., "Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK)," RFC 5295, Aug. 2008.
-
(2008)
RFC 5295
-
-
Salowey, J.1
|