Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security In Mobile Ipv6.
IPv6 Mobil (Bergerak) membolehkan sesuatu nod dipindahkan daripada satu rangkaian ke rangkaian lain tanpa adanya sebarang gangguan komunikasi pada nod. Mobile IPv6 allows a node to move from one network to another network without any disruption in communication at the node.
| Main Author: | S. Alsayfi, Majed Salam |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/24568/ http://eprints.usm.my/24568/1/INTEGRATING_IDENTITY_BASED_ENCRYPTION_IBE_IN_THE_RETURN_ROUTABILITY_PROTOCOL_RRP_TO_ENHANCE_SIGNALS_SECURITY_IN_MOBILE_IPv6.pdf |
Similar Items
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Performance evaluation of identity-based encryption (IBE) remote attestation protocol in wireless sensor networks / Roszainiza Rosli
by: Rosli, Roszainiza
Published: (2014)
by: Rosli, Roszainiza
Published: (2014)
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol / Hero Modares
by: Modares, Hero
Published: (2013)
by: Modares, Hero
Published: (2013)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
by: Zare Anari, Abbas Mehdizadeh
Published: (2008)
Study on security of IPv6 address management in enterprise WLAN
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
Handoff latency analysis of mobile IPv6 protocol variations
by: Haseeb, Shariq, et al.
Published: (2007)
by: Haseeb, Shariq, et al.
Published: (2007)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Enhancing security on IPv6 neighbor discovery using trust-ND.
by: Chong , Yung Wey
Published: (2017)
by: Chong , Yung Wey
Published: (2017)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
RRP diberi tiga bulan kemuka laporan interim
by: Berita Harian
Published: (2018)
by: Berita Harian
Published: (2018)
Comparative performance analysis of mobile IPv6 protocols: special reference to simultaneous bindings
by: Haseeb, Shariq, et al.
Published: (2006)
by: Haseeb, Shariq, et al.
Published: (2006)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Quality of service (QOS) between IPv4 and IPv6 on MPLS linux platform / Nor Asyikin Abu Bakar
by: Abu Bakar, Nor Asyikin
Published: (2006)
by: Abu Bakar, Nor Asyikin
Published: (2006)
An efficient group-based control signalling within proxy mobile IPv6 protocol
by: Ghaleb, Safwan Mahmood Yahya, et al.
Published: (2019)
by: Ghaleb, Safwan Mahmood Yahya, et al.
Published: (2019)
SL1M-IBE TNB pacu keupayaan graduan
by: Badrul Hafizan, Mat Isa
Published: (2017)
by: Badrul Hafizan, Mat Isa
Published: (2017)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Research on design and implementation of secure
attribute-based encryption framework for body sensor networks
by: Tan, Yar Ling
Published: (2014)
by: Tan, Yar Ling
Published: (2014)
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
by: Norhidayah, Muhammad, et al.
Published: (2012)
by: Norhidayah, Muhammad, et al.
Published: (2012)
Self learning module on securing IPV6 deployment / Muhamad Nazif Shahaimi Zaha
by: Zaha, Muhamad Nazif Shahaimi
Published: (2019)
by: Zaha, Muhamad Nazif Shahaimi
Published: (2019)
Securing medical data transmission systems based on integrating algorithm of encryption and steganography
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
The study of multicast hierarchical mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
An Enhanced Ipv6 Anycast Routing Protocol Using Protocol Independent Multicast-Sparse Mode With Mobile Ipv6
by: Sulaiman, Aus M.
Published: (2007)
by: Sulaiman, Aus M.
Published: (2007)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
An alternative route optimization handoff scheme for mobile IPV6
by: Attir, Hisham Mostafa
Published: (2008)
by: Attir, Hisham Mostafa
Published: (2008)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
by: Shaikh, Muhammad Umair, et al.
Published: (2018)
by: Shaikh, Muhammad Umair, et al.
Published: (2018)
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
Ipv6 Migration Framework For Government Agencies In
Malaysia
by: Mohinder Singh, A Winder Kaur
Published: (2009)
by: Mohinder Singh, A Winder Kaur
Published: (2009)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks
by: Sadiq, Ali Safa, et al.
Published: (2014)
by: Sadiq, Ali Safa, et al.
Published: (2014)
Similar Items
-
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010) -
Performance evaluation of identity-based encryption (IBE) remote attestation protocol in wireless sensor networks / Roszainiza Rosli
by: Rosli, Roszainiza
Published: (2014) -
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007) -
Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol / Hero Modares
by: Modares, Hero
Published: (2013) -
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)