LEADER 03241nam 2200697Ia 450 001 9911019444603321 005 20200520144314.0 010 $a9786611841072 010 $a9781281841070 010 $a1281841072 010 $a9780470772898 010 $a0470772891 010 $a9780470772904 010 $a0470772905 024 7 $a10.1002/9780470772898 035 $a(CKB)1000000000555734 035 $a(EBL)366876 035 $a(SSID)ssj0000173165 035 $a(PQKBManifestationID)11169771 035 $a(PQKBTitleCode)TC0000173165 035 $a(PQKBWorkID)10164652 035 $a(PQKB)11063843 035 $a(MiAaPQ)EBC366876 035 $a(CaBNVSL)mat08040062 035 $a(IDAMS)0b00006485f0e347 035 $a(IEEE)8040062 035 $a(OCoLC)264621173 035 $a(PPN)226271110 035 $a(Perlego)2761799 035 $a(EXLCZ)991000000000555734 100 $a20080212d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHost Identity Protocol (HIP) $etowards the secure mobile Internet /$fAndrei Gurtov 210 $aChichester, West Sussex, England ;$aHoboken, NJ, USA $cWiley$dc2008 215 $a1 online resource (323 p.) 225 1 $aWiley series on communications networking & distributed systems 225 1 $aWiley series in communications networking & distributed systems 300 $aDescription based upon print version of record. 311 08$a9780470997901 311 08$a0470997907 320 $aIncludes bibliographical references and index. 327 $aForeword / Jari Arkko -- Foreword / David Hutchison -- Introduction to network security -- Architectural overview -- Base protocol -- Main extensions -- Advanced extensions -- Performance measurements -- Lightweight HIP -- Infrastructure support -- Middlebox traversal -- Name resolution -- Micromobility -- Communication privacy -- Possible HIP applications -- Application interface -- Integrating HIP with other protocols -- Installing and using HIP. 330 $a"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it." - Jari Arkko, Internet Area Director, IETF One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HI 410 0$aWiley series in communications networking & distributed systems. 606 $aWireless Internet$xSecurity measures 606 $aHost Identity Protocol (Computer network protocol) 615 0$aWireless Internet$xSecurity measures. 615 0$aHost Identity Protocol (Computer network protocol) 676 $a005.8 700 $aGurtov$b Andrei$0523693 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911019444603321 996 $aHost identity protocol (HIP$9828965 997 $aUNINA