Integrating Security, Mobility and Multi-Homing in a HIP Way.
Pekka NikanderJukka YlitaloJorma WallPublished in: NDSS (2003)
Keyphrases
- information security
- network security
- factor authentication
- security requirements
- mobile agents
- intrusion detection
- statistical databases
- security policies
- security threats
- network management
- security issues
- computer networks
- functional requirements
- security model
- security systems
- security management
- human mobility
- access control