{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:33:03Z","timestamp":1729661583943,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/iciinfs.2015.7398986","type":"proceedings-article","created":{"date-parts":[[2016,2,4]],"date-time":"2016-02-04T16:55:06Z","timestamp":1454604906000},"page":"60-65","source":"Crossref","is-referenced-by-count":4,"title":["Performance analysis of open-source Linux-based HIP implementations"],"prefix":"10.1109","author":[{"given":"Jude","family":"Okwuibe","sequence":"first","affiliation":[]},{"given":"Madhusanka","family":"Liyanage","sequence":"additional","affiliation":[]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Improving the Tunnel Management Performance of Secure VPLS Architectures with SDN","author":"liyanage","year":"2016","journal-title":"Proc IEEE Consum Commun Netw Conf (CCNC)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918981"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2015.43"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2015.7194059"},{"key":"ref10","article-title":"Shim6: Level 3 Multihoming Shim Protocol for IPv 6","author":"nordmark","year":"2009","journal-title":"Tech Rep"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2008.4699577"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3934\/jimo.2015.11.887"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682712"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2447014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2012.6399037"},{"year":"0","key":"ref16","article-title":"LINKSYS WUMC710 WIRELESS-AC UNIVERSAL MEDIA CONNECTOR"},{"year":"0","key":"ref17","article-title":"Iperf"},{"key":"ref18","article-title":"The Host Identity Protocol (HIP) Experiment Report","author":"henderson","year":"2012","journal-title":"Tech Rep"},{"key":"ref19","article-title":"Host Identity Protocol Version 2 (HIPv2)","author":"moskowitz","year":"2015","journal-title":"Tech Rep"},{"year":"0","key":"ref28","article-title":"DII-HEP (CMS) cluster"},{"article-title":"Host Identity Protocol (HIP) Architecture","year":"2006","author":"nikander","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2015.7247513"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.021110.00070"},{"year":"2014","key":"ref6","article-title":"OpenHIP: About OpenHIP"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/9781118900253"},{"year":"2015","key":"ref5","article-title":"InfraHIPHIP: About InfraHIP"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/sec.701"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6554720"},{"journal-title":"Host Identity Protocol Towrds the Secure Mobile Internet","year":"2008","author":"andrei","key":"ref2"},{"key":"ref9","first-page":"23","article-title":"The Locator Identifier Separation Protocol (LISP)","volume":"11","author":"meyer","year":"2008","journal-title":"The Internet Protocol Journal"},{"key":"ref1","first-page":"27","article-title":"Host Identity Protocol: Identifier\/Locator Split for Host Mobility and Multihoming","volume":"12","author":"andrei","year":"0","journal-title":"The Internet Protocol Journal"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.17487\/rfc7402","article-title":"Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP)","author":"jokela","year":"2015"},{"year":"0","key":"ref22","article-title":"Boeing HIP Secure Mobile Architecture"},{"article-title":"RFC 5201 Host Identity Protocol","year":"2008","author":"moskowitz","key":"ref21"},{"year":"0","key":"ref24","article-title":"Tofino Security Appliance"},{"year":"0","key":"ref23","article-title":"GE Transportation"},{"year":"0","key":"ref26","article-title":"Tempered Networks"},{"year":"0","key":"ref25","article-title":"Asguard Networks"}],"event":{"name":"2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS)","start":{"date-parts":[[2015,12,18]]},"location":"Peradeniya, Sri Lanka","end":{"date-parts":[[2015,12,20]]}},"container-title":["2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7391617\/7398966\/07398986.pdf?arnumber=7398986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T04:30:04Z","timestamp":1567571404000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7398986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iciinfs.2015.7398986","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}