Secure IPv6 address generation
| Main Authors: | -, Nashrul Hakiem, Siddiqi, Mohammad Umar, Jarot, Sigit Puspito Wigati |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/21359/ http://irep.iium.edu.my/21359/1/19.pdf |
Similar Items
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
Securing OFDM-based systems from the physical layer
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Recent approaches to wireless physical layer security
by: -, M.Tahir, et al.
Published: (2011)
by: -, M.Tahir, et al.
Published: (2011)
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Simulation of artificial noise based physical layer security
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
Zigzag codes: high rate low complexity iterative codes
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Convolutional coded OFDM in broadband mobile communication
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
Study on security of IPv6 address management in enterprise WLAN
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012)
by: Hakiem, Nashrul, et al.
Published: (2012)
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)
by: Hakiem, Nashrul, et al.
Published: (2015)
Spectrum sensing for cognitive radios
by: Abu Hanifah, Izyan munyati, et al.
Published: (2011)
by: Abu Hanifah, Izyan munyati, et al.
Published: (2011)
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Analysis of hybrid stepper motor performance under the influence of voltage supply interference
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
The study of multicast hierarchical mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Turbo codes: an error correction technique for 4G
by: Masud , Mosharrof Hussain, et al.
Published: (2011)
by: Masud , Mosharrof Hussain, et al.
Published: (2011)
Cryptographic boolean functions: transform domain perspective
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
GSM security: problems and solutions
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2011)
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2011)
Performance comparison of (Diff-FH NEMO) scheme in IPv6-based network mobility
by: Hussein, Loay F., et al.
Published: (2016)
by: Hussein, Loay F., et al.
Published: (2016)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Video coding : MPEG standards
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Generalized discrete fourier transform based improvement of partial transmit sequence scheme to reduce PAPR in OFDM systems
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2015)
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2015)
Deployment challenges of MIPV6
by: Masud, Mosharrof Hussain, et al.
Published: (2011)
by: Masud, Mosharrof Hussain, et al.
Published: (2011)
Security management in heterogeneous distributed sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
Analysis of handoff latency factors for MIPV6 network
by: Masud, Masharrof Hussain, et al.
Published: (2011)
by: Masud, Masharrof Hussain, et al.
Published: (2011)
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016)
by: Khan, Burhan ul Islam, et al.
Published: (2016)
Throughput enhancement in cognitive radio network via coalition formation using matching theory
by: Tahir, Mohammad, et al.
Published: (2015)
by: Tahir, Mohammad, et al.
Published: (2015)
The investigation of frame disturbance (fd) in perceptual evaluation speech quality (PESQ) as a perceptual metric
by: Jusoh, Ahmad Zamani, et al.
Published: (2015)
by: Jusoh, Ahmad Zamani, et al.
Published: (2015)
Q-switched thulium-doped fibre laser operating at 1900 nm using multi-walled carbon nanotubes saturable absorber
by: Saidin, Norazlina, et al.
Published: (2014)
by: Saidin, Norazlina, et al.
Published: (2014)
Determination of fade margin for Ka band operating in equatorial region
by: Suhaimi, N.H.S, et al.
Published: (2018)
by: Suhaimi, N.H.S, et al.
Published: (2018)
Autonomic Internet of things for enforced demand
management in smart grid
by: Ashraf, Qazi Mamoon, et al.
Published: (2017)
by: Ashraf, Qazi Mamoon, et al.
Published: (2017)
RF parameters characterization of a flexible Cu-PDMS-Cu patch antenna
by: Mohd Ramly, Athirah, et al.
Published: (2017)
by: Mohd Ramly, Athirah, et al.
Published: (2017)
Design and analysis of 1-to-4 Wilkinson power divider for antenna array feeding network
by: Shaikh, Faraz Ahmed, et al.
Published: (2018)
by: Shaikh, Faraz Ahmed, et al.
Published: (2018)
Similar Items
-
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012) -
Securing OFDM-based systems from the physical layer
by: Jarot, Sigit Puspito Wigati
Published: (2011) -
Recent approaches to wireless physical layer security
by: -, M.Tahir, et al.
Published: (2011) -
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014) -
Simulation of artificial noise based physical layer security
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)