Its central features were the use of the Host Identity Protocol (HIP), cryptographic identities, secure directories, and location to make policy-based information about users and the network available to applications, management systems, and intelligent network components.
architecture | Georgian architecture | Gothic architecture | Mobile, Alabama | Gothic Revival architecture | Romanesque architecture | Norman architecture | Victorian architecture | T-Mobile | Colonial architecture | Neoclassical architecture | Baroque architecture | Romanesque Revival architecture | mobile phone | Architecture | Brutalist architecture | Mobile phone | Beaux-Arts architecture | Mobile | Italianate architecture | Federal architecture | Renaissance architecture | Mobile Suit Zeta Gundam | Windows Mobile | mobile | Tudor Revival architecture | Modern architecture | Secure Shell | ARM architecture | Greek Revival architecture |