Cited By
View all- Zugenmaier ALaganier JPrasad ASlavov K(2010)Anchor-Less Secure Session MobilitySecurity Protocols10.1007/978-3-642-17773-6_11(104-109)Online publication date: 2010
This is a report from your faithful IETF correspondent, covering some of the relevant events at the 42nd IETF conference in Chicago, IL. Milestones were reached, and promising new developments are taking shape. Chief among the milestones was the passage ...
In this paper, we consider the problem of providing multicast to mobile hosts using Mobile IP for network routing support. Providing multicast in an internetwork with mobile hosts is made difficult because many multicast protocols are inefficient when ...
As the popularity of mobile computing grows, the associated protocols and their scalability are subject to much closer scrutiny. Mobile IP relies heavily on the use of IP-to-IP tunneling, requiring 20 bytes of overhead for every packet routed to or from ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in