Study on attacking and defending techniques in IPv6 networks
暂无分享,去创建一个
Wu Liu | Ke Liu | Ping Ren | Donghong Sun | Yawei Zhao
[1] Matt Crawford,et al. Transmission of IPv6 Packets over Ethernet Networks , 1998, RFC.
[2] Satyajayant Misra,et al. CluRoL: Clustering based Robust Localization in Wireless Sensor Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[3] Stephen E. Deering,et al. Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) , 1995, RFC.
[4] Liu Wu,et al. Study on Anti-Attack Model for Low-Latency Anonymous Communication System , 2012, 2012 Second International Conference on Cloud and Green Computing.
[5] Thomas Narten,et al. Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.
[6] Wu Liu,et al. Mobile Intelligent Terminal Based Remote Monitoring and Management System , 2012, 2012 Third Cybercrime and Trustworthy Computing Workshop.
[7] Donald E. Eastlake,et al. Domain Name System Security Extensions , 1997, RFC.
[8] Stephen E. Deering,et al. Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification , 2006, RFC.
[9] Sarvesh Bhardwaj,et al. Secure and Robust Localization in a Wireless Ad Hoc Environment , 2009, IEEE Transactions on Vehicular Technology.
[10] Wu Jian-ping,et al. H6Proxy: ICMPv6 Weakness Analysis and Implementation of IPv6 Attacking Test Proxy , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.
[11] Wu Liu,et al. A Data Security Protection Mechanism Based on Transparent Biometric Authentication for Mobile Intelligent Terminals , 2012, 2012 Third Cybercrime and Trustworthy Computing Workshop.