Journal articles on the topic 'Host identity protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Host identity protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Malik, Gaurav, and Anshul Anand. "Real Study of Host Identity Protocol." International Journal of Computer Trends and Technology 11, no. 5 (May 25, 2014): 231–33. http://dx.doi.org/10.14445/22312803/ijctt-v11p149.
Full textLevä, Tapio, Miika Komu, Ari Keränen, and Sakari Luukkainen. "Adoption barriers of network layer protocols: The case of host identity protocol." Computer Networks 57, no. 10 (July 2013): 2218–32. http://dx.doi.org/10.1016/j.comnet.2012.11.024.
Full textBen Jemaa, Maher, Nahla Abid, Maryline Laurent-Maknavicius, and Hakima Chaouchi. "Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks." Journal of Computer Systems, Networks, and Communications 2009 (2009): 1–6. http://dx.doi.org/10.1155/2009/383517.
Full textYang, Shuigen, Huachun Zhou, Yajuan Qin, and Hongke Zhang. "SHIP: Cross-layer mobility management scheme based on Session Initiation Protocol and Host Identity Protocol." Telecommunication Systems 42, no. 1-2 (June 12, 2009): 5–15. http://dx.doi.org/10.1007/s11235-009-9164-y.
Full textFaigl, Zoltán, and Miklós Telek. "Modeling the signaling overhead in Host Identity Protocol-based secure mobile architectures." Journal of Industrial & Management Optimization 11, no. 3 (2015): 887–920. http://dx.doi.org/10.3934/jimo.2015.11.887.
Full textBokor, László, Zoltán Faigl, and Sándor Imre. "Survey and Evaluation of Advanced Mobility Management Schemes in the Host Identity Layer." International Journal of Wireless Networks and Broadband Technologies 3, no. 1 (January 2014): 34–59. http://dx.doi.org/10.4018/ijwnbt.2014010103.
Full textHossain, Mahmud, and Ragib Hasan. "P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things." IEEE Internet of Things Journal 8, no. 1 (January 1, 2021): 555–71. http://dx.doi.org/10.1109/jiot.2020.3009024.
Full textNikander, Pekka, Andrei Gurtov, and Thomas R. Henderson. "Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks." IEEE Communications Surveys & Tutorials 12, no. 2 (2010): 186–204. http://dx.doi.org/10.1109/surv.2010.021110.00070.
Full textPorambage, Pawani, An Braeken, Pardeep Kumar, Andrei Gurtov, and Mika Ylianttila. "CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things." Wireless Personal Communications 96, no. 1 (April 29, 2017): 421–40. http://dx.doi.org/10.1007/s11277-017-4176-5.
Full textLee, Chan Haeng, and Ji Su Park. "A Design for SDN-Based Identifier–Locator Separation Architecture on IoT Networks." Applied Sciences 10, no. 6 (March 21, 2020): 2144. http://dx.doi.org/10.3390/app10062144.
Full textToledo, Nerea, Marivi Higuero, Jasone Astorga, Marina Aguado, and Jean Marie Bonnin. "Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity Protocol." Computers & Security 32 (February 2013): 1–18. http://dx.doi.org/10.1016/j.cose.2012.09.014.
Full textWu, Shao Xing, Yu Jun Ma, and Yan Tie Xiang. "A Secure Networking Architecture for the Internet of Things." Advanced Materials Research 108-111 (May 2010): 135–40. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.135.
Full textSandal-Önal, Elif, Aydın Bayad, Andreas Zick, and N. Ekrem Düzen. "Transnational Influences on Migrant Identities and Social Cohesion: A Study Protocol." Genealogy 6, no. 1 (January 24, 2022): 9. http://dx.doi.org/10.3390/genealogy6010009.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "Building Scalable and Secure Multicast Delivery Infrastructure in a Local Area Network." Electronics 8, no. 10 (October 14, 2019): 1162. http://dx.doi.org/10.3390/electronics8101162.
Full textSingh, R. P., A. D. Dilworth, V. K. Baranwal, and K. N. Gupta. "Detection of Citrus exocortis viroid, Iresine viroid, and Tomato chlorotic dwarf viroid in New Ornamental Host Plants in India." Plant Disease 90, no. 11 (November 2006): 1457. http://dx.doi.org/10.1094/pd-90-1457a.
Full textWeliwita, Chathurika. "Performance Study on 5G - NSA Backhaul Network Secured with HIP." International Journal of Advanced Networking and Applications 14, no. 06 (2023): 5705–16. http://dx.doi.org/10.35444/ijana.2023.14607.
Full textFaigl, Zoltán. "Performance analysis of signalling overhead in Host Identity Protocol-based secure mobile networks: Ultra Flat Architecture or end-to-end signalling?" Wireless Networks 21, no. 2 (September 6, 2014): 531–55. http://dx.doi.org/10.1007/s11276-014-0797-8.
Full textKaňuch, Peter, and Dominik Macko. "E-HIP: An Energy-Efficient OpenHIP-Based Security in Internet of Things Networks." Sensors 19, no. 22 (November 12, 2019): 4921. http://dx.doi.org/10.3390/s19224921.
Full textLiu, Xing Yu. "A Handoff Mechanism to Support Micro-Mobility of HIP." Advanced Materials Research 505 (April 2012): 317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.505.317.
Full textVarjonen, Samu, Miika Komu, and Andrei Gurtov. "Secure and Efficient IPv4/IPv6 Handovers Using Host-Based Identifier-Locator Split." Journal of Communications Software and Systems 6, no. 1 (March 21, 2010): 1. http://dx.doi.org/10.24138/jcomss.v6i1.193.
Full textLindqvist, Janne, Essi Vehmersalo, Miika Komu, and Jukka Manner. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities." International Journal of Handheld Computing Research 1, no. 1 (January 2010): 79–94. http://dx.doi.org/10.4018/jhcr.2010090905.
Full textBettoumi, Balkis, and Ridha Bouallegue. "LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things." Sensors 21, no. 21 (November 4, 2021): 7348. http://dx.doi.org/10.3390/s21217348.
Full textBeirn, Lisa A., William A. Meyer, Bruce B. Clarke, and Jo Anne Crouch. "A Greenhouse-based Inoculation Protocol for Fungi Causing Crown Rust and Stem Rust Diseases of Kentucky Bluegrass Turf." HortScience 50, no. 10 (October 2015): 1509–13. http://dx.doi.org/10.21273/hortsci.50.10.1509.
Full textKrstic, Predrag. "Reflecting the secret." Theoria, Beograd 50, no. 2 (2007): 35–46. http://dx.doi.org/10.2298/theo0702035k.
Full textRosati, Fau, Valentina Coletta, Jessica Pistella, Cristiano Scandurra, Fiorenzo Laghi, and Roberto Baiocco. "Experiences of Life and Intersectionality of Transgender Refugees Living in Italy: A Qualitative Approach." International Journal of Environmental Research and Public Health 18, no. 23 (November 25, 2021): 12385. http://dx.doi.org/10.3390/ijerph182312385.
Full textSalhi, Dhai Eddine, Abelkamel Tari, and Mohand Tahar Kechadi. "Using Clustering for Forensics Analysis on Internet of Things." International Journal of Software Science and Computational Intelligence 13, no. 1 (January 2021): 56–71. http://dx.doi.org/10.4018/ijssci.2021010104.
Full textHuguet, Valerie, Janet Mccray Batzli, Jeff F. Zimpfer, Philippe Normand, Jeffrey O. Dawson, and Maria P. Fernandez. "Diversity and Specificity of Frankia Strains in Nodules of Sympatric Myrica gale, Alnus incana, andShepherdia canadensis Determined by rrsGene Polymorphism." Applied and Environmental Microbiology 67, no. 5 (May 1, 2001): 2116–22. http://dx.doi.org/10.1128/aem.67.5.2116-2122.2001.
Full textK.C, Amir, Harri Forsgren, Kaj Grahn, Timo Karvi, and Göran Pulkkis. "Security and Trust of Public Key Cryptography for HIP and HIP Multicast." International Journal of Dependable and Trustworthy Information Systems 2, no. 3 (July 2011): 17–35. http://dx.doi.org/10.4018/jdtis.2011070102.
Full textHendrickson, Erik L., Pablo Guevera, Alejandro Peñaloza-Vàzquez, Jing Shao, Carol Bender, and Frederick M. Ausubel. "Virulence of the Phytopathogen Pseudomonas syringae pv. Maculicola Is rpoN Dependent." Journal of Bacteriology 182, no. 12 (June 15, 2000): 3498–507. http://dx.doi.org/10.1128/jb.182.12.3498-3507.2000.
Full textKaur, R., A. R. McTaggart, D. M. Ferrin, and M. C. Aime. "First Report of Uromyces plumbarius, Rust of Gaura, in Louisiana and a new host, Guara lindheimeri." Plant Disease 96, no. 4 (April 2012): 590. http://dx.doi.org/10.1094/pdis-12-11-1020.
Full textChauhan, Ravendra P., Ronen Fogel, and Janice Limson. "Nanopore MinION Sequencing Generates a White Spot Syndrome Virus Genome from a Pooled Cloacal Swab Sample of Domestic Chickens in South Africa." Microorganisms 11, no. 11 (November 18, 2023): 2802. http://dx.doi.org/10.3390/microorganisms11112802.
Full textBianco, L. F., E. C. Martins, R. S. Toloy, D. A. B. Coletti, D. C. Teixeira, and N. A. Wulff. "First Report of Phytoplasmas Groups 16SrI and 16SrXV in Crotalaria juncea in Brazil." Plant Disease 98, no. 7 (July 2014): 990. http://dx.doi.org/10.1094/pdis-11-13-1190-pdn.
Full textAntonia, Alejandro L., Liuyang Wang, and Dennis C. Ko. "A real-time PCR assay for quantification of parasite burden in murine models of leishmaniasis." PeerJ 6 (November 9, 2018): e5905. http://dx.doi.org/10.7717/peerj.5905.
Full textWittke, Vanessa, Harald Binder, Stefan Zimmermann, Dietmar Pfeifer, Martin Schumacher, Juergen Finke, and Hendrik Veelken. "SELDI-TOF-Based Proteomic Analysis of Plasma Samples as a Diagnostic Tool to Predict Acute Graft-Versus-Host Disease after Allogeneic Stem Cell Transplantation." Blood 112, no. 11 (November 16, 2008): 1165. http://dx.doi.org/10.1182/blood.v112.11.1165.1165.
Full textViršček Marn, M., and I. Mavrič Pleško. "First Report of Tomato chlorotic dwarf viroid in Petunia spp. in Slovenia." Plant Disease 94, no. 9 (September 2010): 1171. http://dx.doi.org/10.1094/pdis-94-9-1171b.
Full textNirwan, Figur Muhammad Ali Putra, Josina Augustina Yvonne Wattimena, and Arman Anwar. "Bentuk Pertanggungjawaban Pelanggaran Ham Terhadap Tawanan Perang Menurut Hukum Dan Ham Internasional." TATOHI: Jurnal Ilmu Hukum 3, no. 7 (October 23, 2023): 632. http://dx.doi.org/10.47268/tatohi.v3i7.1849.
Full textLi, Y. P., D. G. Wright, V. Lanoiselet, C. P. Wang, N. Eyres, D. Real, M. P. You, and M. J. Barbetti. "First Report of Phoma herbarum on Tedera (Bituminaria bituminosa var. albomarginata) in Australia." Plant Disease 96, no. 5 (May 2012): 769. http://dx.doi.org/10.1094/pdis-12-11-1040-pdn.
Full textDemissie, Yohannes, Christèle Humblot, Bridget Baxter, Nora Jean Nealon, and Elizabeth Ryan. "Probiotic Fermentation of Rice Bran with Six Genetically Diverse Strains Effects Nutrient and Phytochemical Composition; a Non-Targeted Metabolomics Approach." Current Developments in Nutrition 4, Supplement_2 (May 29, 2020): 1553. http://dx.doi.org/10.1093/cdn/nzaa062_010.
Full textWegener, L. A., Z. K. Punja, and R. R. Martin. "First Report of Blueberry scorch virus in Black Huckleberry in British Columbia." Plant Disease 91, no. 3 (March 2007): 328. http://dx.doi.org/10.1094/pdis-91-3-0328c.
Full textBhunjun, Chitrabhanu S., Alan J. L. Phillips, Ruvishika S. Jayawardena, Itthayakorn Promputtha, and Kevin D. Hyde. "Importance of Molecular Data to Identify Fungal Plant Pathogens and Guidelines for Pathogenicity Testing Based on Koch’s Postulates." Pathogens 10, no. 9 (August 28, 2021): 1096. http://dx.doi.org/10.3390/pathogens10091096.
Full textJones, Rhys Aled, Chelsea N. Davis, Dewi Llyr Jones, Fiona Tyson, Emma Davies, David Cutress, Peter M. Brophy, Michael T. Rose, Manod Williams, and Hefin Wyn Williams. "Temporal dynamics of trematode intermediate snail host environmental DNA in small water body habitats." Parasitology 148, no. 12 (June 30, 2021): 1490–96. http://dx.doi.org/10.1017/s0031182021001104.
Full textDong, Yuran, Xinqiang Xi, Hanxiang Chen, Yangheshan Yang, and Shucun Sun. "A Protocol to Identify the Host of Parasitoids by DNA Barcoding of Vestigial Tissues." Annales Zoologici Fennici 57, no. 1-6 (May 14, 2020): 11. http://dx.doi.org/10.5735/086.057.0102.
Full textNischwitz, C., S. W. Mullis, R. D. Gitaitis, and A. S. Csinos. "First Report of Tomato spotted wilt virus in Soybean (Glycine max) in Georgia." Plant Disease 90, no. 4 (April 2006): 524. http://dx.doi.org/10.1094/pd-90-0524b.
Full textRobertson, N. L., K. L. Brown, L. M. Winton, and P. S. Holloway. "First Report of Tobacco rattle virus in Peony in Alaska." Plant Disease 93, no. 6 (June 2009): 675. http://dx.doi.org/10.1094/pdis-93-6-0675b.
Full textDrzewnioková, Petra, Francesca Festa, Valentina Panzarin, Davide Lelli, Ana Moreno, Barbara Zecchin, Paola De Benedictis, and Stefania Leopardi. "Best Molecular Tools to Investigate Coronavirus Diversity in Mammals: A Comparison." Viruses 13, no. 10 (October 1, 2021): 1975. http://dx.doi.org/10.3390/v13101975.
Full textKuczera, Konrad, Anna Orłowska, Marcin Smreczak, Maciej Frant, Paweł Trębas, and Jerzy Rola. "Prevalence of Astroviruses in Different Animal Species in Poland." Viruses 16, no. 1 (January 4, 2024): 80. http://dx.doi.org/10.3390/v16010080.
Full textAbbaszadegan, M., P. Ghatpande, J. Brereton, A. Alum, and R. Narasimhan. "Laboratory testing protocol to identify critical factors in bacterial compliance monitoring." Water Science and Technology 47, no. 3 (February 1, 2003): 131–36. http://dx.doi.org/10.2166/wst.2003.0181.
Full textHong, EJ, C. Sim, JS Chae, HC Kim, J. Park, KS Choi, DH Yu, CH Park, JG Yoo, and BK Park. "Ultrastructural and molecular identification of Sarcocystis tenella (Protozoa, Apicomplexa) in naturally infected Korean native goats." Veterinární Medicína 61, No. 7 (July 18, 2016): 374–81. http://dx.doi.org/10.17221/93/2015-vetmed.
Full textScherrer, Simon, Markus Legner, Adrian Perrig, and Stefan Schmid. "An Axiomatic Perspective on the Performance Effects of End-Host Path Selection." ACM SIGMETRICS Performance Evaluation Review 49, no. 3 (March 22, 2022): 16–17. http://dx.doi.org/10.1145/3529113.3529118.
Full textChauhan, Ritu, and Gatha Tanwar. "A Machine Learning-Based Exploration of Relationship Between Security Vulnerabilities of IoT Devices and Manufacturers." International Journal of Data Analytics 1, no. 2 (July 2020): 1–12. http://dx.doi.org/10.4018/ijda.2020070101.
Full text