Its central features were the use of the Host Identity Protocol (HIP), cryptographic identities, secure directories, and location to make policy-based information about users and the network available to applications, management systems, and intelligent network components.
Transmission Control Protocol | File Transfer Protocol | Session Initiation Protocol | User Datagram Protocol | BitTorrent (protocol) | Kyoto Protocol | Internet Protocol | Post Office Protocol | Program and System Information Protocol | Simple Network Management Protocol | host | Internet Message Access Protocol | Network File System (protocol) | Hypertext Transfer Protocol | Lightweight Directory Access Protocol | The Bourne Identity | Secure Real-time Transport Protocol | Real-time Transport Protocol | Alex Jones (radio host) | Simple Mail Transfer Protocol | Montreal Protocol | Communications protocol | Wireless Application Protocol | The Bourne Identity (2002 film) | SSH File Transfer Protocol | My Secret Identity | Identity Cards Act 2006 | Bill Cunningham (talk show host) | Remote Desktop Protocol | Point-to-Point Protocol |