Framework for Domain Name System Security Extensions (DNSSEC) to support the IPv6 infrastructure
The major problem in DNS as originally specified in RFC 1035 is that it does not offer any form of security and it is vulnerable to spoofing, man-in-the-middle and cache poisoning attacks. This kind of attacks can compromise all communications to the host that initiate any connection that requires a...
| Main Authors: | Mantoro, Teddy, Ayu, Media Anugerah, Bidin, Ahmad Fakhrurrazi, Norhanipah, Saiful Azhar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
The World Academic Publishing Co., Limited
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28579/ http://irep.iium.edu.my/28579/1/CISME10489-20121228-150736-9988-1323_DNSSEC.pdf |
Similar Items
An implementation on domain name system security extensions framework for the support of IPv6 environment
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
IPv4 and IPv6 client-server designs: the sockets performance
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
The implementation strategy of DNSSEC in strengthening digital government security in Malaysia
by: Ahmad Syukri Abdullah,, et al.
Published: (2022)
by: Ahmad Syukri Abdullah,, et al.
Published: (2022)
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Web-enabled smart home using wireless node infrastructure
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
Online authentication using smart card technology in mobile phone infrastructure
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Online payment procedure involving mobile phone network infrastructure and devices
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
Study on security of IPv6 address management in enterprise WLAN
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
Security enhancement of route optimization in mobile IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2008)
by: Mehdizadeh, Abbas, et al.
Published: (2008)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
Development of security in wireless sensor network using IPv6
by: Jayapal, Vikneswary
Published: (2009)
by: Jayapal, Vikneswary
Published: (2009)
A comprehensive survey of the current trends and extensions for the proxy mobile IPv6 protocol
by: Jabir, Adnan J., et al.
Published: (2015)
by: Jabir, Adnan J., et al.
Published: (2015)
Key Management for Secure Multicast over IPv6 Wireless Networks
by: Aye, Win, et al.
Published: (2006)
by: Aye, Win, et al.
Published: (2006)
Distinctive key management method to secure multicast IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2009)
by: Mehdizadeh, Abbas, et al.
Published: (2009)
Secure multicast group communication scheme in wireless IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2014)
by: Mehdizadeh, Abbas, et al.
Published: (2014)
An enhanced secured mobile IPv6 with multicast function and hierarchical design
by: Khatun, Sabira, et al.
Published: (2009)
by: Khatun, Sabira, et al.
Published: (2009)
Enhancing security on IPv6 neighbor discovery using trust-ND.
by: Chong , Yung Wey
Published: (2017)
by: Chong , Yung Wey
Published: (2017)
Secured knowledge sharing and creation using RBAC model for e-village
by: Usino, Wendi, et al.
Published: (2012)
by: Usino, Wendi, et al.
Published: (2012)
Inter-domain handover in WiMAX networks using optimized fast mobile IPv6.
by: Seyyedoshohadaei, Seyyed Masoud, et al.
Published: (2012)
by: Seyyedoshohadaei, Seyyed Masoud, et al.
Published: (2012)
Improving IPv6 Packets Transmission Over High Speed Networks By Introducing CRC Extension Header
by: Supriyanto, .
Published: (2010)
by: Supriyanto, .
Published: (2010)
Quality-improved and secure multicast delivery method in mobile IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2011)
by: Mehdizadeh, Abbas, et al.
Published: (2011)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
by: M., Zulkiflee, et al.
Published: (2011)
by: M., Zulkiflee, et al.
Published: (2011)
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
by: M., Zulkiflee, et al.
Published: (2011)
by: M., Zulkiflee, et al.
Published: (2011)
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
by: Muslim, Z., et al.
Published: (2011)
by: Muslim, Z., et al.
Published: (2011)
User pro-activities based on context history
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Exploring a 'plug and play' smart home system for mobile user
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Analyzing and managing the disturbance in a mining port stockyard system
by: Ayu, Media Anugerah, et al.
Published: (2010)
by: Ayu, Media Anugerah, et al.
Published: (2010)
Improving the accuracy of indoor user location using IEEE 802.11 signals
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Toward the recognition of user activity based on user location in ubiquitous computing environments
by: Mantoro, Teddy, et al.
Published: (2008)
by: Mantoro, Teddy, et al.
Published: (2008)
Supporting student participation and interactivity in the classroom using mobile phones.
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Supporting student participation and interactivity in the classroom using mobile phones.
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
VisUn-3D : Visualization of user navigation using 3D maps in virtual 3D walk-spaces for mobile user
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
An example-based machine translation approach for Bahasa Indonesia to English: an experiment using MOSES
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Self learning module on securing IPV6 deployment / Muhamad Nazif Shahaimi Zaha
by: Zaha, Muhamad Nazif Shahaimi
Published: (2019)
by: Zaha, Muhamad Nazif Shahaimi
Published: (2019)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win Lye, et al.
Published: (2005)
by: Aye, Win Lye, et al.
Published: (2005)
Similar Items
-
An implementation on domain name system security extensions framework for the support of IPv6 environment
by: Mantoro, Teddy, et al.
Published: (2011) -
IPv4 and IPv6 client-server designs: the sockets performance
by: Mantoro, Teddy, et al.
Published: (2012) -
The implementation strategy of DNSSEC in strengthening digital government security in Malaysia
by: Ahmad Syukri Abdullah,, et al.
Published: (2022) -
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007) -
Web-enabled smart home using wireless node infrastructure
by: Mantoro, Teddy, et al.
Published: (2011)