Comment on “Design and formal security evaluation of NeMHIP”

T Wang, D Ji - Computers & Security, 2015 - Elsevier
T Wang, D Ji
Computers & Security, 2015Elsevier
Abstract In [Computers & Security 32 (2013) 1–18], the authors proposed a new network
mobility management protocol named NeMHIP which was based on the HIP. What's more,
the authors had demonstrated the security of NeMHIP. However, there are two simple but
vital mistakes in the NeMHIP. Fortunately, we propose solutions to solve these mistakes. In
this note, we will present a corrected NeMHIP.
Abstract
In [Computers & Security 32 (2013) 1–18], the authors proposed a new network mobility management protocol named NeMHIP which was based on the HIP. What's more, the authors had demonstrated the security of NeMHIP. However, there are two simple but vital mistakes in the NeMHIP. Fortunately, we propose solutions to solve these mistakes. In this note, we will present a corrected NeMHIP.
Elsevier
Showing the best result for this search. See all results