An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
Cryptographically Generated Address (CGA) Signatures are a promising feature of Mobile IPv6 (MIPv6) and are slowly being considered suitable for signing the Binding Update (BU) message. However, the use of the Rivest- Shamir-Adleman (RSA) by the CGA signature algorithms is considered to be a ve...
| Main Authors: | Qadir, Sana, Siddiqi, Mohammad Umar, Al-Khateeb, Wajdi Fawzi Mohammed |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
International Journal of Network Security
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/39299/ http://irep.iium.edu.my/39299/1/39299.pdf |
Similar Items
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012)
by: Qadir , Sana, et al.
Published: (2012)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012)
by: Hakiem, Nashrul, et al.
Published: (2012)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)
by: Hakiem, Nashrul, et al.
Published: (2015)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
Secure scheme for user authentication and authorization in android environment
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Cryptographic boolean functions: transform domain perspective
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
Methods For Generating Cryptographic Keys From Online Hand Signatures
by: Yip, Wai Kuan
Published: (2007)
by: Yip, Wai Kuan
Published: (2007)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Routing scheme for macro mobility handover in hierarchical
mobile IPv6 network
by: Vivaldi, Indra, et al.
Published: (2003)
by: Vivaldi, Indra, et al.
Published: (2003)
An enhanced scheme for QoS in mobile IPv6 environment
by: Hussien, Loay F., et al.
Published: (2011)
by: Hussien, Loay F., et al.
Published: (2011)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
A New Proxy Signature Scheme As Secure As ElGamal Signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
Cryptanalysis of the SHMW signature scheme
by: Lau, Terry Shue Chien, et al.
Published: (2024)
by: Lau, Terry Shue Chien, et al.
Published: (2024)
An integrated scheme to improve performance of fast mobile IPv6 handover in IEEE 802.16e network
by: Seyyedoshohadaei, Seyyed Masoud, et al.
Published: (2009)
by: Seyyedoshohadaei, Seyyed Masoud, et al.
Published: (2009)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Rank AGS identification scheme and signature scheme
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
Future Internet Addressing (FI Address)
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Study On Signature-Based Network Intrusion Detection System For High-Speed Network Using Network Processing Unit (NPU)
by: Salim, Robin
Published: (2007)
by: Salim, Robin
Published: (2007)
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005)
by: Kurosawa, Kaoru, et al.
Published: (2005)
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007)
by: Heng, Swee-Huay, et al.
Published: (2007)
Comprehensive downtime prediction in next-generation internet
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2004)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2004)
Reliability enhancement of complex networks through redundancy scaling
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2010)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2010)
Reliability evaluation of scalable complex networks through delta-star conversion
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2008)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2008)
Recovery modeling in MPLS networks
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2006)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2006)
Comprehensive downtime prediction in next generation internet
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2004)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2004)
The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network
by: Che-Aron, Zamree, et al.
Published: (2010)
by: Che-Aron, Zamree, et al.
Published: (2010)
ENFAT-AODV: the fault-tolerant routing protocol for high failure rate Wireless Sensor Networks
by: Che-Aron, Zamree, et al.
Published: (2010)
by: Che-Aron, Zamree, et al.
Published: (2010)
Similar Items
-
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014) -
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015) -
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012) -
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011) -
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)