Collision probability of one-to-many reversible mapping for IPV6 address generation
The paper presents results of collision probability evaluation of a one-to-many reversible mapping between user space and IPv6 address space which is developed to improve of IPv6 addresses generation in a local area network (LAN). Each time a user accesses the network, a dynamic unicast IPv6 addre...
| Main Authors: | Nashrul Hakiem, Nashrul Hakiem, Siddiqi, Mohammad Umar, Jarot, Sigit Puspito Wigati |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28315/ http://irep.iium.edu.my/28315/1/ICCCE_2012_-_Nashrul_-_pp_599_-_602.pdf |
Similar Items
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012)
by: Hakiem, Nashrul, et al.
Published: (2012)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
One-to-many reversible mapping for IPv6 address management
by: Priantoro, Akhmal Unggul, et al.
Published: (2010)
by: Priantoro, Akhmal Unggul, et al.
Published: (2010)
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)
by: Hakiem, Nashrul, et al.
Published: (2015)
Study on security of IPv6 address management in enterprise WLAN
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
Implementation of IPv6 address generation mechanism for enterprise wireless local area network in open source DHCPv6
by: Hakiem, Nashrul, et al.
Published: (2010)
by: Hakiem, Nashrul, et al.
Published: (2010)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Zigzag codes: high rate low complexity iterative codes
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Convolutional coded OFDM in broadband mobile communication
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Securing OFDM-based systems from the physical layer
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Recent approaches to wireless physical layer security
by: -, M.Tahir, et al.
Published: (2011)
by: -, M.Tahir, et al.
Published: (2011)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Simulation of artificial noise based physical layer security
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Intelligent decision support system for degree selection using AHP technique
by: Jamil, Rokiah, et al.
Published: (2012)
by: Jamil, Rokiah, et al.
Published: (2012)
Analysis of p2p communication over various mobile platforms
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2013)
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2013)
Impulsive noise effects on DWT-OFDM versus FFT-OFDM
by: Abdullah, Khaizuran, et al.
Published: (2011)
by: Abdullah, Khaizuran, et al.
Published: (2011)
Managing the risks of big-data environment through data protection law: the position in Malaysia and Indonesia
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
Noise modulated cryptographic generation for use in UWB wireless communication
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
Smart grid communication layer
by: Lokeman, Norulhuda, et al.
Published: (2011)
by: Lokeman, Norulhuda, et al.
Published: (2011)
Experimental implementation of dynamic spectrum access for video transmission using USRP
by: Tahir, Mohammad, et al.
Published: (2012)
by: Tahir, Mohammad, et al.
Published: (2012)
Application of neural networks in early detection and diagnosis of parkinson's disease
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012)
by: Qadir , Sana, et al.
Published: (2012)
Data breach on the critical information infrastructures: lessons from the Wikileaks
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us?
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
by: Abdul Ghani Azmi, Ida Madieha, et al.
Published: (2012)
The many faces of 'one'
by: Abd Razak, Dzulkifli
Published: (2009)
by: Abd Razak, Dzulkifli
Published: (2009)
QoS Mechanism With Probability For IPv6-Based IPTV Network.
by: H.S, Primantara, et al.
Published: (2009)
by: H.S, Primantara, et al.
Published: (2009)
Spectrum sensing for cognitive radios
by: Abu Hanifah, Izyan munyati, et al.
Published: (2011)
by: Abu Hanifah, Izyan munyati, et al.
Published: (2011)
Future Internet Addressing (FI Address)
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
One gene, many proteins: mapping cell-specific alternative splicing in plants
by: Swarup, Ranjan, et al.
Published: (2016)
by: Swarup, Ranjan, et al.
Published: (2016)
Key Management for Secure Multicast over IPv6 Wireless Networks
by: Aye, Win, et al.
Published: (2006)
by: Aye, Win, et al.
Published: (2006)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
Similar Items
-
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014) -
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013) -
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011) -
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012) -
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)