close
1.

電子ブック

EB
Lars Eggert, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , ACM, 2008
所蔵情報: loading…
2.

電子ブック

EB
Lars Eggert, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , ACM, 2009
所蔵情報: loading…
3.

電子ブック

EB
Lars Eggert, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York, NY : ACM, 2012
所蔵情報: loading…
4.

電子ブック

EB
Lars Eggert, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York NY : ACM, 2016
所蔵情報: loading…
5.

電子ブック

EB
Andrei Gurtov, Lars Eggert
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2008
所蔵情報: loading…
目次情報: 続きを見る
About the Author
Foreword / Jari Arkko
Preface / David Hutchison
Acknowledgments
Abbreviations
Introduction / Part I:
Overview / Chapter 1:
Identifiera locatorsplit / 1.1:
HIPin the Internet architecture / 1.2:
Brief history of HIP / 1.3:
Organization of the book / 1.4:
Introduction to network security / Chapter 2:
Goals of cryptographic protocols / 2.1:
Basics and terminology / 2.2:
Attacktypes / 2.3:
Defense mechanisms / 2.4:
Security protocols / 2.5:
Weak authentication techniques / 2.6:
Secure DNS / 2.7:
The Host Identity Protocol / Part II:
Architectural overview / Chapter 3:
Internet namespaces / 3.1:
Methods of identifying a host / 3.2:
Over lay Routable Cryp to graphic Has Identifiers / 3.3:
Baseprotocol / Chapter 4:
Base exchange / 4.1:
Other HIP control packets / 4.2:
IPsec encapsulation / 4.3:
Main extensions / Chapter 5:
Mobility and multihoming / 5.1:
Rendezvous server / 5.2:
DNS extensions / 5.3:
Registration protocol / 5.4:
Advanced extensions / Chapter 6:
Opportunistic mode / 6.1:
Piggy backing transport headers to base exchange / 6.2:
HIP service discovery / 6.3:
Simultaneous multiaccess / 6.4:
Disseminating HITs with a presence service / 6.5:
Multicast / 6.6:
Performance measurements / Chapter 7:
HIP on Nokia Internet Tablet / 7.1:
Experimental results / 7.2:
Summary / 7.3:
Lightweight HIP / Chapter 8:
Security functionality of HIP / 8.1:
HIP high-levelgoals / 8.2:
LHIP design / 8.3:
LHIP performance / 8.4:
Discussion / 8.5:
Infrastructure Support / Part III:
Middlebox traversal / Chapter 9:
Requirements for traversing legacy middle boxes / 9.1:
Legacy NAT traversal / 9.2:
Requirements for HIP-aware middleboxes / 9.3:
HIP-aware firewall / 9.4:
Name resolution / Chapter 10:
Problem statement of naming / 10.1:
Distributed Hash Tables / 10.2:
HIP interface to Open DHT / 10.3:
Overview of over lay networks / 10.4:
Host Identity Indirection Infrastructure / 10.5:
Separating control,data, andnaming / 10.5.1:
Thedata plane / 10.5.2:
The control plane / 10.5.3:
Discussion of the Hi3 design / 10.5.4:
Micromobility / Chapter 11:
Local rendezvousservers / 11.1:
Secure micromobility / 11.2:
Network mobility / 11.3:
Communication privacy / Chapter 12:
SPINAT / 12.1:
BLIND / 12.2:
Anonymousidentifiers / 12.3:
Applications / Part IV:
Possible HIP applications / Chapter 13:
Virtual Private Networking / 13.1:
P2P Internet Sharing Architecture / 13.2:
Inter operating IPv 4 and IPv 6 / 13.3:
Secure Mobile Architecture / 13.4:
Live application migration / 13.5:
Network operator view point on HIP / 13.6:
Application interface / Chapter 14:
Using legacy applications with HIP / 14.1:
API fornative HIP applications / 14.2:
Integrating HIP with other protocols / Chapter 15:
Generalized HIP / 15.1:
The use of Session Initiation Protocol / 15.2:
Encapsulating HIP data using SRTP / 15.3:
Replacing HIP base exchange with IKEv2 / 15.4:
Mobile IP and HIP / 15.5:
HIP proxy for legacy hosts / 15.6:
Installing and using HIP
Bibliography
Index
About the Author
Foreword / Jari Arkko
Preface / David Hutchison
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼