{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:57:04Z","timestamp":1725494224439},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540758525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75853-2_1","type":"book-chapter","created":{"date-parts":[[2007,11,3]],"date-time":"2007-11-03T07:18:16Z","timestamp":1194074296000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Peer-to-Peer Naming Infrastructure for Next Generation Networks"],"prefix":"10.1007","author":[{"given":"Ramy","family":"Farha","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Leon-Garcia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"National Science Foundation. The GENI Initiative, http:\/\/www.geni.net"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Akyildiz, I.F., et al.: A survey of mobility management in next-generation all-IP-based wireless systems. IEEE Wireless Communications, 16\u201328 (2004)","DOI":"10.1109\/MWC.2004.1325888"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Widlund, E.: Application-Layer Mobility Using SIP. ACM SIGMOBILE Mobile Computing and Communications Review, 47\u201357 (2000)","DOI":"10.1145\/372346.372369"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, T., et al.: Overcoming the Internet Impasse through Virtualization. IEEE Computer, 34\u201341 (2005)","DOI":"10.1109\/MC.2005.136"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P.: Host Identity Protocol (HIP) Architecture. RFC 4423 (2006)","DOI":"10.17487\/rfc4423"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Balakrishnan, H., et al.: A layered naming architecture for the Internet. In: Proceedings of the conference on applications, technologies, architectures, and protocols for computer communications, pp. 343\u2013352 (2004)","DOI":"10.1145\/1015467.1015505"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Ahlgren, B., et al.: Names, Addresses and Identities in Ambient Networks. Dynamic Interconnection of Networks Workshop (2005)","DOI":"10.1145\/1080776.1080788"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/3-540-45866-2_16","volume-title":"Pervasive Computing","author":"M. Balazinska","year":"2002","unstructured":"Balazinska, M., et al.: INS\/Twine A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery. In: Mattern, F., Naghshineh, M. (eds.) Pervasive Computing. LNCS, vol.\u00a02414, pp. 195\u2013210. Springer, Heidelberg (2002)"},{"key":"1_CR9","unstructured":"Stoica, I., et al.: A scalable peer-to-peer lookup service for internet applications. MIT, Tech. Rep. TR-819 (2001)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Montresor, A.: A Robust Protocol for Building Superpeer Overlay Topologies. In: Proceedings of the 4th IEEE International Conference on Peer-to-Peer Computing, pp. 202\u2013209 (2004)","DOI":"10.1109\/PTP.2004.1334948"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Garces-Erice, L., et al.: Hierarchical P2P Systems. In: Proceedings of ACM\/IFIP International Conference on Parallel and Distributed Computing, pp. 1230\u20131239 (2003)","DOI":"10.1007\/978-3-540-45209-6_166"},{"key":"1_CR12","first-page":"1946","volume-title":"Proceedings of the Next-Generation Mobile Networks Symposium at the IEEE International Communications Conference (ICC)","author":"R. Farha","year":"2006","unstructured":"Farha, R., et al.: Peer-to- Peer Mobility Management for all-IP Networks. In: Proceedings of the Next-Generation Mobile Networks Symposium at the IEEE International Communications Conference (ICC), pp. 1946\u20131952. IEEE, Los Alamitos (2006)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Farha, R., et al.: Peer-to- Peer Vertical Mobility Management. In: Proceedings of the Network Services and Operations Symposium at the IEEE International Communications Conference (ICC) (to appear, 2007)","DOI":"10.1109\/ICC.2007.308"},{"key":"1_CR14","unstructured":"Lo, S.: Mobility Management Using P2P Techniques in Wireless Networks. Journal of Information Science and Engineering, 421\u2013439 (2007)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Mastroiannia, C., et al.: A super-peer model for resource discovery services in large-scale Grids. Elsevier Journal on Future Generation Computer Systems, 1235\u20131248 (2005)","DOI":"10.1016\/j.future.2005.06.001"},{"key":"1_CR16","unstructured":"National Technical Information Service, U.S. Dept. Commerce \/ NIST: Secure Hash Standard, FIPS 180-1 (1995)"}],"container-title":["Lecture Notes in Computer Science","IP Operations and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75853-2_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:34:49Z","timestamp":1619519689000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75853-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540758525"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75853-2_1","relation":{},"subject":[]}}