Generation of IPv6 addresses based on one-to-many reversible mapping using AES
The proliferation of enterprise wireless network raises the security concern in any organization despite the unarguable benefits it brings about. At the same time, the initiative to migrate from IPv4 (Internet Protocol version four) to IPv6 (Internet Protocol version six) is gaining momentum across...
| Main Authors: | Hakiem, Nashrul, Priantoro, Akhmad Unggul, Siddiqi, Mohammad Umar, Hasan, Talib Hashim |
|---|---|
| Other Authors: | Gaol, Ford Lumban |
| Format: | Book Chapter |
| Language: | English English |
| Published: |
Springer-Verlag
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28295/ http://irep.iium.edu.my/28295/1/Springer_-_2012_-_Generation_of_IPv6_Addresses_Based_on_-_pp_183-189.pdf http://irep.iium.edu.my/28295/2/Recent_Progress_in_DEIT_Front_Cover.pdf |
Similar Items
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
One-to-many reversible mapping for IPv6 address management
by: Priantoro, Akhmal Unggul, et al.
Published: (2010)
by: Priantoro, Akhmal Unggul, et al.
Published: (2010)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)
by: Hakiem, Nashrul, et al.
Published: (2015)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Implementation of IPv6 address generation mechanism for enterprise wireless local area network in open source DHCPv6
by: Hakiem, Nashrul, et al.
Published: (2010)
by: Hakiem, Nashrul, et al.
Published: (2010)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
A review on multiplexing schemes for MIMO channel sounding
by: Ullah, Mohammad Habib, et al.
Published: (2009)
by: Ullah, Mohammad Habib, et al.
Published: (2009)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012)
by: Qadir , Sana, et al.
Published: (2012)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
Future Internet Addressing (FI Address)
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
A new multicast-based architecture to support host mobility in IPv6
by: M. Ali, Borhanuddin, et al.
Published: (2003)
by: M. Ali, Borhanuddin, et al.
Published: (2003)
Design of robust protocol to enhance QoS in mobile IPV6 environment
by: Hussien, Loay F., et al.
Published: (2010)
by: Hussien, Loay F., et al.
Published: (2010)
Macro/micro-mobility fast handover in hierarchical mobile IPv6
by: Habaebi, Mohamed Hadi
Published: (2006)
by: Habaebi, Mohamed Hadi
Published: (2006)
Service recovery of multicast hierarchical mobile IPV6 with context transfer
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
by: Vivaldi, Indra, et al.
Published: (2003)
by: Vivaldi, Indra, et al.
Published: (2003)
Routing scheme for macro mobility handover in hierarchical
mobile IPv6 network
by: Vivaldi, Indra, et al.
Published: (2003)
by: Vivaldi, Indra, et al.
Published: (2003)
Lightweight handover control function (L-HCF) for Mobile Internet Protocol version Six (IPv6)
by: Mokhtar, Rania A., et al.
Published: (2014)
by: Mokhtar, Rania A., et al.
Published: (2014)
Comprehensive QoS analysis of MIPL based mobile IPv6 using single VS. dual interfaces
by: Uddin, Mohammad Moshee, et al.
Published: (2011)
by: Uddin, Mohammad Moshee, et al.
Published: (2011)
An integrated scheme to improve performance of fast mobile IPv6 handover in IEEE 802.16e network
by: Seyyedoshohadaei, Seyyed Masoud, et al.
Published: (2009)
by: Seyyedoshohadaei, Seyyed Masoud, et al.
Published: (2009)
Fuzzy logic based handoff latency reduction mechanism in layer 2 of heterogeneous mobile IPv6 networks
by: Anwar, Farhat, et al.
Published: (2013)
by: Anwar, Farhat, et al.
Published: (2013)
AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
by: Udaya, Paramapalli, et al.
Published: (1998)
by: Udaya, Paramapalli, et al.
Published: (1998)
Optimal biphase sequences with large linear complexity derived from sequences over Z4
by: Udaya, Paramapalli, et al.
Published: (1996)
by: Udaya, Paramapalli, et al.
Published: (1996)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
Vertical handoff reduction mechanism using IEEE 802.21 standard in mobile IPv6 (MIPv6) network
by: Masud, Mosharrof Hussain, et al.
Published: (2012)
by: Masud, Mosharrof Hussain, et al.
Published: (2012)
Enhanced handoff latency reduction mechanism in layer 2 and layer 3 of mobile IPv6 (MIPv6) network
by: Anwar, Farhat, et al.
Published: (2013)
by: Anwar, Farhat, et al.
Published: (2013)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Analysis of autocorrelation function of Boolean functions in Haar domain
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Haar spectrum of Bent Boolean functions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
The avalanche and propagation characteristics from Haar
perspective with extended linear and Bent Haar
conditions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Haar spectrum based construction of resilient and plateaued boolean functions
by: Rafiq, Hashum M., et al.
Published: (2017)
by: Rafiq, Hashum M., et al.
Published: (2017)
Correlation immunity and resiliency of boolean functions from haar domain perspective
by: Rafiq, Hashum M., et al.
Published: (2015)
by: Rafiq, Hashum M., et al.
Published: (2015)
Similar Items
-
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014) -
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012) -
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013) -
One-to-many reversible mapping for IPv6 address management
by: Priantoro, Akhmal Unggul, et al.
Published: (2010) -
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)