Session resumption for the secure shell protocol

J Schonwalder, G Chulkov, E Asgarov… - 2009 IFIP/IEEE …, 2009 - ieeexplore.ieee.org
The secure shell protocol (SSH) is widely deployed to access command line interfaces of
network devices and host systems over an insecure network. Recently, the IETF has …

Disruption-tolerant sessions for seamless mobility

BYL Kimura, HC Guardia… - 2012 IEEE Wireless …, 2012 - ieeexplore.ieee.org
Current ubiquitous computing technologies provide access to customized, contextual, and
location-based services. Device mobility, however, is frequently associated with …

[PDF][PDF] Delay tolerance and the future internet

J Ott - Proceedings of the 11th International Symposium on …, 2008 - netlab.tkk.fi
The Internet protocols were designed to provide end-to-end connectivity across
heterogeneous networks, yet primarily assuming a “fixed” and rather static network …

Design and implementation of a mobile SSH protocol

IH Huang, WJ Tzeng, SW Wang… - TENCON 2006-2006 …, 2006 - ieeexplore.ieee.org
SSH (secure shell) is a very popular secure communication application. Users can remotely
login to servers through SSH channels with security protection. However, since the SSH …

Muses: Mobile user secured session

D Ahmat, D Magoni - 2012 IFIP Wireless Days, 2012 - ieeexplore.ieee.org
Mobility and security are very important services for both current and future network
infrastructures. However, the integration of mobility in traditional virtual private networks is …

Prototyping applications to handle connection disruptions in end-to-end host mobility

BYL Kimura, RS Yokoyama, RRF Lopes… - … on wireless on …, 2010 - ieeexplore.ieee.org
Several solutions have been proposed for Mobility Management in the Internet, ranging from
the Network to the Application Layer. Existing support for mobility management is designed …

Leap-of-faith security is enough for ip mobility

M Komu, J Lindqvist - 2009 6th IEEE Consumer …, 2009 - ieeexplore.ieee.org
Host mobility presents a challenge for security protocols. For example, many proposals exist
for integrating IPsec to mobile IP. However, the existing approaches are cumbersome to …

Mobivpn: A mobile vpn providing persistency to applications

A Alshalan, S Pisharody… - … Conference on Computing …, 2016 - ieeexplore.ieee.org
Virtual Private Network (VPN) is the traditional approach for an end-to-end secure
connection between two endpoints. But conventional VPN solutions are intended for wired …

Authentication session migration

S Suoranta, J Heikkinen, P Silvekoski - Nordic Conference on Secure IT …, 2010 - Springer
Consumers increasingly access services with different devices such as desktop
workstations, notepad computers and mobile phones. When they want to switch to another …

The CHIANTI architecture for robust mobile Internet access

J Ott, P Ylikoski, N Seifert, C Carroll… - … Symposium on a …, 2009 - ieeexplore.ieee.org
The quality of Internet access for mobile users may suffer from highly variable
communication characteristics (packet loss, delay, throughput) and from temporary …