Secure verification technique for defending IP spoofing attacks.
Alwar RengarajanRajendran SugumarChinnappan JayakumarPublished in: Int. Arab J. Inf. Technol. (2016)
Keyphrases
- cryptographic protocols
- ddos attacks
- ip address
- ip addresses
- security mechanisms
- security protocols
- secure routing
- stream cipher
- security issues
- integrity verification
- chosen plaintext
- denial of service attacks
- security threats
- high security
- standard model
- block cipher
- java card
- face verification
- security analysis
- smart card
- authentication protocol
- security flaws
- authentication scheme
- unauthorized access
- cryptographic algorithms
- resource constrained
- remote user authentication scheme
- countermeasures
- security management
- advanced encryption standard
- end hosts