Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks.
Do Hyeon LeeJeom Goo KimPublished in: KES (3) (2006)
Keyphrases
- internet protocol
- network layer
- campus network
- ip addresses
- end to end
- enterprise network
- security vulnerabilities
- network traffic
- ip address
- security model
- computer networks
- digital signature scheme
- network security
- address space
- auto configuration
- social networks
- application layer
- complex networks
- buffer overflow
- key management
- cellular networks
- authentication mechanism
- risk assessment
- elliptic curve
- information security
- denial of service
- access control
- network structure
- protection scheme
- communication networks
- security issues
- security analysis
- private key
- key distribution