One-to-many reversible mapping for IPv6 address management
| Main Authors: | Priantoro, Akhmal Unggul, Hakiem, Nashrul, Siddiqi, Muhammad Umar, Hasan, Talib Hashim |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Online Access: | http://irep.iium.edu.my/23158/ http://irep.iium.edu.my/23158/1/p122.pdf |
Similar Items
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012)
by: Hakiem, Nashrul, et al.
Published: (2012)
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)
by: Hakiem, Nashrul, et al.
Published: (2015)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Implementation of IPv6 address generation mechanism for enterprise wireless local area network in open source DHCPv6
by: Hakiem, Nashrul, et al.
Published: (2010)
by: Hakiem, Nashrul, et al.
Published: (2010)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
Study on security of IPv6 address management in enterprise WLAN
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Key Management for Secure Multicast over IPv6 Wireless Networks
by: Aye, Win, et al.
Published: (2006)
by: Aye, Win, et al.
Published: (2006)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005)
by: Poh, Eric C. K., et al.
Published: (2005)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win Lye, et al.
Published: (2005)
by: Aye, Win Lye, et al.
Published: (2005)
The many faces of 'one'
by: Abd Razak, Dzulkifli
Published: (2009)
by: Abd Razak, Dzulkifli
Published: (2009)
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
One gene, many proteins: mapping cell-specific alternative splicing in plants
by: Swarup, Ranjan, et al.
Published: (2016)
by: Swarup, Ranjan, et al.
Published: (2016)
Research direction in mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
by: M., Zulkiflee, et al.
Published: (2011)
by: M., Zulkiflee, et al.
Published: (2011)
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
by: M., Zulkiflee, et al.
Published: (2011)
by: M., Zulkiflee, et al.
Published: (2011)
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
by: Muslim, Z., et al.
Published: (2011)
by: Muslim, Z., et al.
Published: (2011)
Multicast-unicast key management scheme in IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2014)
by: Mehdizadeh, Abbas, et al.
Published: (2014)
IPv4 and IPv6 client-server designs: the sockets performance
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
The study of multicast hierarchical mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Prevention Mechanism Against Denial Of Service Attack On Duplicate Address Detection Process In Ipv6 Link-Local Networks
by: Ibrahim Al-Ani, Ahmed Khallel
Published: (2020)
by: Ibrahim Al-Ani, Ahmed Khallel
Published: (2020)
New perspectives on the IPv6 transition
by: Dell, Peter
Published: (2009)
by: Dell, Peter
Published: (2009)
Route Optimisation For Mobile Ipv6
by: Yahaya, Coulibaly
Published: (2002)
by: Yahaya, Coulibaly
Published: (2002)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
Design and testing of an experimental IPv4-to-IPv6 transition network / Mustaffa Samad
by: Samad, Mustaffa
Published: (2006)
by: Samad, Mustaffa
Published: (2006)
Behavioral Analysis on IPv4 Malware on different platforms in IPv6 Network Environment
by: M., Zulkiflee, et al.
Published: (2011)
by: M., Zulkiflee, et al.
Published: (2011)
Mobile multicast in hierarchical proxy mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2013)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2013)
An Enhanced Ipv6 Anycast Routing Protocol Using Protocol Independent Multicast-Sparse Mode With Mobile Ipv6
by: Sulaiman, Aus M.
Published: (2007)
by: Sulaiman, Aus M.
Published: (2007)
An enhanced scheme for QoS in mobile IPv6 environment
by: Hussien, Loay F., et al.
Published: (2011)
by: Hussien, Loay F., et al.
Published: (2011)
Some reflections on IPv6 adoption in Australia
by: Dell, Peter, et al.
Published: (2008)
by: Dell, Peter, et al.
Published: (2008)
Similar Items
-
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012) -
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014) -
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012) -
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013) -
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)