LEADER 03160nam 2200661 450 001 9910830105703321 005 20230125203854.0 010 $a1-281-84107-2 010 $a9786611841072 010 $a0-470-77289-1 010 $a0-470-77290-5 024 7 $a10.1002/9780470772898 035 $a(CKB)1000000000555734 035 $a(EBL)366876 035 $a(SSID)ssj0000173165 035 $a(PQKBManifestationID)11169771 035 $a(PQKBTitleCode)TC0000173165 035 $a(PQKBWorkID)10164652 035 $a(PQKB)11063843 035 $a(MiAaPQ)EBC366876 035 $a(CaBNVSL)mat08040062 035 $a(IDAMS)0b00006485f0e347 035 $a(IEEE)8040062 035 $a(OCoLC)264621173 035 $a(PPN)226271110 035 $a(EXLCZ)991000000000555734 100 $a20171024d2008 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHost Identity Protocol (HIP) $etowards the secure mobile Internet /$fAndrei Gurtov 210 1$aChichester, U.K. :$cWiley,$d2008. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2008] 215 $a1 online resource (323 p.) 225 1 $aWiley series on communications networking & distributed systems 225 1 $aWiley series in communications networking & distributed systems 300 $aDescription based upon print version of record. 311 $a0-470-99790-7 320 $aIncludes bibliographical references and index. 327 $aForeword / Jari Arkko -- Foreword / David Hutchison -- Introduction to network security -- Architectural overview -- Base protocol -- Main extensions -- Advanced extensions -- Performance measurements -- Lightweight HIP -- Infrastructure support -- Middlebox traversal -- Name resolution -- Micromobility -- Communication privacy -- Possible HIP applications -- Application interface -- Integrating HIP with other protocols -- Installing and using HIP. 330 $a"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it." - Jari Arkko, Internet Area Director, IETF One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HI 410 0$aWiley series in communications networking & distributed systems. 606 $aWireless Internet$xSecurity measures 606 $aHost Identity Protocol (Computer network protocol) 615 0$aWireless Internet$xSecurity measures. 615 0$aHost Identity Protocol (Computer network protocol) 676 $a004.62 676 $a005.8 700 $aGurtov$b Andrei$0523693 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910830105703321 996 $aHost identity protocol (HIP$9828965 997 $aUNINA