Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
This paper presents simulation results on randomness test of a cryptographic one-to-many reversible mapping between user space and the IPv6 address space. A one-to-many reversible mapping mechanism is developed which may be embedded into a DHCPv6 (Dynamic Host Configuration Protocol for IPv6) serv...
| Main Authors: | Hakiem, Nashrul, Siddiqi, Mohammad Umar, Jarot, Sigit Puspito W., Priantoro, Akhmad Unggul |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Little Lion Scientific Islamabad Pakistan
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/39298/ http://irep.iium.edu.my/39298/1/Nashrul_-_JATIT_2014_-_Randomness_Test_....._-_Galley_Proof.pdf http://irep.iium.edu.my/39298/2/Print_-_JATIT_2014.htm |
Similar Items
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012)
by: Hakiem, Nashrul, et al.
Published: (2012)
One-to-many reversible mapping for IPv6 address management
by: Priantoro, Akhmal Unggul, et al.
Published: (2010)
by: Priantoro, Akhmal Unggul, et al.
Published: (2010)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)
by: Hakiem, Nashrul, et al.
Published: (2015)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Study on security of IPv6 address management in enterprise WLAN
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
Implementation of IPv6 address generation mechanism for enterprise wireless local area network in open source DHCPv6
by: Hakiem, Nashrul, et al.
Published: (2010)
by: Hakiem, Nashrul, et al.
Published: (2010)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012)
by: Qadir , Sana, et al.
Published: (2012)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Noise modulated cryptographic generation for use in UWB wireless communication
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
Recent approaches to wireless physical layer security
by: -, M.Tahir, et al.
Published: (2011)
by: -, M.Tahir, et al.
Published: (2011)
A review on multiplexing schemes for MIMO channel sounding
by: Ullah, Mohammad Habib, et al.
Published: (2009)
by: Ullah, Mohammad Habib, et al.
Published: (2009)
Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
Zigzag codes: high rate low complexity iterative codes
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Convolutional coded OFDM in broadband mobile communication
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Securing OFDM-based systems from the physical layer
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Cryptographic boolean functions: transform domain perspective
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
Simulation of artificial noise based physical layer security
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
Analysis of p2p communication over various mobile platforms
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2013)
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2013)
Impulsive noise effects on DWT-OFDM versus FFT-OFDM
by: Abdullah, Khaizuran, et al.
Published: (2011)
by: Abdullah, Khaizuran, et al.
Published: (2011)
The many faces of 'one'
by: Abd Razak, Dzulkifli
Published: (2009)
by: Abd Razak, Dzulkifli
Published: (2009)
Randomness analysis of pseudo random noise generator using 24-bits LFSR
by: Yaacob, Siti Hazwani, et al.
Published: (2014)
by: Yaacob, Siti Hazwani, et al.
Published: (2014)
Intelligent decision support system for degree selection using AHP technique
by: Jamil, Rokiah, et al.
Published: (2012)
by: Jamil, Rokiah, et al.
Published: (2012)
Future Internet Addressing (FI Address)
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Key Management for Secure Multicast over IPv6 Wireless Networks
by: Aye, Win, et al.
Published: (2006)
by: Aye, Win, et al.
Published: (2006)
An investigation into clustering routing protocols for wireless sensor networks
by: Salami, Abdulazeez F., et al.
Published: (2009)
by: Salami, Abdulazeez F., et al.
Published: (2009)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
Design of robust protocol to enhance QoS in mobile IPV6 environment
by: Hussien, Loay F., et al.
Published: (2010)
by: Hussien, Loay F., et al.
Published: (2010)
Macro/micro-mobility fast handover in hierarchical mobile IPv6
by: Habaebi, Mohamed Hadi
Published: (2006)
by: Habaebi, Mohamed Hadi
Published: (2006)
Similar Items
-
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012) -
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012) -
One-to-many reversible mapping for IPv6 address management
by: Priantoro, Akhmal Unggul, et al.
Published: (2010) -
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014) -
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)