Integrated Framework For Secure Distributed Management Of Duplicated Ipv6 Address Detection
Alamat bernegara auto-konfigurasi adalah ciri utama protokol IPv6, yang membolehkan tuan rumah untuk mengkonfigurasi alamat IP secara automatik tanpa perlu apa-apa perkhidmatan tambahan seperti; DHCPv6 Stateless address auto-configuration is the primary feature of IPv6 protocol, which allows host...
| Main Author: | Ul Rehman, Shafiq |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/38652/ http://eprints.usm.my/38652/1/Integrated_framework_for_secure_distributed_management_of_duplicated_IPv6_address_detection_by.pdf |
Similar Items
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005)
by: Poh, Eric C. K., et al.
Published: (2005)
Ipv6 Migration Framework For Government Agencies In
Malaysia
by: Mohinder Singh, A Winder Kaur
Published: (2009)
by: Mohinder Singh, A Winder Kaur
Published: (2009)
Enhancing security on IPv6 neighbor discovery using trust-ND.
by: Chong , Yung Wey
Published: (2017)
by: Chong , Yung Wey
Published: (2017)
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
by: Mohammed, Imad Jasim
Published: (2011)
by: Mohammed, Imad Jasim
Published: (2011)
QoS Mechanism With Probability For IPv6-Based IPTV Network.
by: H.S, Primantara, et al.
Published: (2009)
by: H.S, Primantara, et al.
Published: (2009)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
IPv6 performance analysis on FreeBSD workstation using simple applications
by: Ettikan, K., et al.
Published: (2000)
by: Ettikan, K., et al.
Published: (2000)
Prevention Mechanism Against Denial Of Service Attack On Duplicate Address Detection Process In Ipv6 Link-Local Networks
by: Ibrahim Al-Ani, Ahmed Khallel
Published: (2020)
by: Ibrahim Al-Ani, Ahmed Khallel
Published: (2020)
Impact of Redhat IPv6 router on heterogeneous host connections
by: Syed Mohamed, Sulaiman, et al.
Published: (2007)
by: Syed Mohamed, Sulaiman, et al.
Published: (2007)
Optimizing The MPLS Support For Real Time IPv6-Flows Using MPLS-PHS Approach.
by: Tat, Chee Wan, et al.
Published: (2009)
by: Tat, Chee Wan, et al.
Published: (2009)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
A Study on Techniques for Handling Transmission Error of IPV6 Packets over Fmer Optic Links
by: Budiarto, Rahmat, et al.
Published: (2010)
by: Budiarto, Rahmat, et al.
Published: (2010)
Improving IPv6 Packets Transmission Over High Speed Networks By Introducing CRC Extension Header
by: Supriyanto, .
Published: (2010)
by: Supriyanto, .
Published: (2010)
Study on security of IPv6 address management in enterprise WLAN
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
Enhanced Automated Heterogeneous Data Duplication Model Using Parallel Data Compression And Sorting Technique
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
Seamsar: Seamless And Secure Handover
Model
For Mobile Iptv Using Mipv6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
Seamsar: Seamless And Secure Handover Model For Mobile IPTV Using MIPV6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Efficient Queue And Gsi Security
Management Framework For Mobile
Desktop Grid
by: Sarwar, Muhammad Imran
Published: (2008)
by: Sarwar, Muhammad Imran
Published: (2008)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Hybrid Hierarchical Approach For Addressing Service
Discovery Issues In MANETS.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
by: Annie Ng, Ai Bee
Published: (2010)
by: Annie Ng, Ai Bee
Published: (2010)
E-commerce today and tomorrow: A truly generalized and active framework for the definition of electronic
by: Poong, , Yewsiang, et al.
Published: (2006)
by: Poong, , Yewsiang, et al.
Published: (2006)
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
An integrated vision-based architecture for home security system
by: See, J., et al.
Published: (2007)
by: See, J., et al.
Published: (2007)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
An Integrated SQA Framework for e-Collaboration
by: Subramanian, T., et al.
Published: (2007)
by: Subramanian, T., et al.
Published: (2007)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
Similar Items
-
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007) -
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011) -
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005) -
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005) -
Ipv6 Migration Framework For Government Agencies In
Malaysia
by: Mohinder Singh, A Winder Kaur
Published: (2009)