{"id":"https://openalex.org/W2034902251","doi":"https://doi.org/10.1145/2089016.2089043","title":"Providing ubiquitous networks securely using host identity protocol (HIP)","display_name":"Providing ubiquitous networks securely using host identity protocol (HIP)","publication_year":2011,"publication_date":"2011-11-09","ids":{"openalex":"https://openalex.org/W2034902251","doi":"https://doi.org/10.1145/2089016.2089043","mag":"2034902251"},"language":"en","primary_location":{"id":"doi:10.1145/2089016.2089043","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2089016.2089043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th Asian Internet Engineering Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012945964","display_name":"Akihiro Takahashi","orcid":"https://orcid.org/0000-0003-1206-5066"},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Akihiro Takahashi","raw_affiliation_strings":["Kyoto University, Yoshida Honmachi, Sakyo-ku, Kyoto, Japan"],"affiliations":[{"raw_affiliation_string":"Kyoto University, Yoshida Honmachi, Sakyo-ku, Kyoto, Japan","institution_ids":["https://openalex.org/I22299242"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108796861","display_name":"Yasuo Okabe","orcid":null},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yasuo Okabe","raw_affiliation_strings":["Kyoto University, Yoshida Honmachi, Sakyo-ku, Kyoto, Japan"],"affiliations":[{"raw_affiliation_string":"Kyoto University, Yoshida Honmachi, Sakyo-ku, Kyoto, Japan","institution_ids":["https://openalex.org/I22299242"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5012945964"],"corresponding_institution_ids":["https://openalex.org/I22299242"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09422071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"156","last_page":"159"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-administrator","display_name":"Network administrator","score":0.8351796865463257},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7895603179931641},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7548336386680603},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6450799703598022},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5746397972106934},{"id":"https://openalex.org/keywords/system-administrator","display_name":"System administrator","score":0.483806312084198},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.46156516671180725},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45056644082069397},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.4281047582626343},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.42746254801750183},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.4206979274749756},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3000285029411316}],"concepts":[{"id":"https://openalex.org/C2779173999","wikidata":"https://www.wikidata.org/wiki/Q680296","display_name":"Network administrator","level":2,"score":0.8351796865463257},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7895603179931641},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7548336386680603},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6450799703598022},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5746397972106934},{"id":"https://openalex.org/C2780814629","wikidata":"https://www.wikidata.org/wiki/Q327353","display_name":"System administrator","level":2,"score":0.483806312084198},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.46156516671180725},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45056644082069397},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.4281047582626343},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.42746254801750183},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.4206979274749756},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3000285029411316},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2089016.2089043","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2089016.2089043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th Asian Internet Engineering Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W326936456","https://openalex.org/W1570907971","https://openalex.org/W1924043382","https://openalex.org/W1927311981","https://openalex.org/W1984471630","https://openalex.org/W2039771690","https://openalex.org/W2156186849","https://openalex.org/W2166065395","https://openalex.org/W2172402645","https://openalex.org/W2246412302","https://openalex.org/W2260273397","https://openalex.org/W2268062820","https://openalex.org/W2282052748","https://openalex.org/W2292630175","https://openalex.org/W2773436718"],"related_works":["https://openalex.org/W1975326709","https://openalex.org/W2398434059","https://openalex.org/W2186689279","https://openalex.org/W2468386885","https://openalex.org/W1668440855","https://openalex.org/W577721519","https://openalex.org/W2349655502","https://openalex.org/W305907398","https://openalex.org/W2944890250","https://openalex.org/W3174219926"],"abstract_inverted_index":{"In":[0,127],"an":[1,52,58,62,138],"ideal":[2],"ubiquitous":[3,125],"network,":[4,129],"anyone":[5],"is":[6,30,101,105],"supposed":[7,31],"to":[8,11,14,22,32,36,68,71,76,106,122,153],"be":[9,69,95,110],"able":[10,70],"get":[12],"connection":[13],"the":[15,23,48,64,73,79,83,86,98,147,156,163],"Internet":[16,24],"as":[17,19,57],"long":[18],"some":[20],"connectivity":[21],"exists":[25],"there.":[26],"A":[27],"network":[28,35,65,87,99,148,157],"administrator":[29,66,88,100,158],"provide":[33],"a":[34],"public":[37],"visitors":[38],"without":[39],"any":[40],"explicit":[41],"permission":[42],"like":[43,152],"registration":[44],"of":[45,165],"users.":[46,166],"At":[47],"same":[49],"time,":[50],"when":[51],"incident":[53],"has":[54,89],"occurred,":[55],"such":[56],"illegal":[59],"access":[60],"by":[61,134],"user,":[63,74],"needs":[67],"trace":[72],"and":[75,162],"clear":[77],"who":[78],"user":[80],"is.":[81],"Additionally,":[82],"proof":[84],"that":[85,140],"not":[90,102,142],"commit":[91],"incorrect":[92],"accesses":[93],"should":[94,109],"ensured":[96],"because":[97],"trusted.":[103],"That":[104],"say,":[107],"nonrepudiation":[108],"ensured.":[111],"To":[112],"solve":[113],"these":[114],"problems,":[115],"we":[116],"apply":[117],"Host":[118],"Identity":[119],"Protocol":[120],"(HIP)":[121],"implement":[123],"secure":[124],"networks.":[126],"our":[128],"users":[130],"can":[131,159],"connect":[132],"only":[133],"HIP.":[135],"We":[136,150],"propose":[137],"authentication":[139],"does":[141],"impose":[143],"management":[144],"work":[145],"on":[146],"administrator.":[149],"would":[151],"discuss":[154],"how":[155],"ensure":[160],"nonrepudiation,":[161],"traceability":[164]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
