2006
DOI: 10.1007/11861386_18
|View full text |Cite
|
Sign up to set email alerts
|

BLIND: A Complete Identity Protection Framework for End-Points

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(16 citation statements)
references
References 10 publications
0
16
0
Order By: Relevance
“…From the former, we find BLIND [11] which is a derivation of HIP centered in security, but it lacks support for negotiating security aspects and needs forwarding agents to get privacy protection.…”
Section: Related Workmentioning
confidence: 99%
“…From the former, we find BLIND [11] which is a derivation of HIP centered in security, but it lacks support for negotiating security aspects and needs forwarding agents to get privacy protection.…”
Section: Related Workmentioning
confidence: 99%
“…SPI multiplexed NAT (SPINAT), as proposed by Ylitalo et al [30,34], is an approach to establish a state for HITs during a HIP base or mobility exchange. The association at the SPINAT device consists of a HIT pair, IP address pair, and ESP SPI pair.…”
Section: Spi Multiplexed Natmentioning
confidence: 99%
“…IP 2 [7], Turfnet [8], I3 [9] and Blind [10], while not focusing on location privacy, address some of the issues. Furthermore, the technique known as 'onion routing' [11] hides location information between layers of transport.…”
Section: Related Workmentioning
confidence: 99%