Design and implementation of an efficient defense mechanism against ARP spoofing attacks using AES and RSA
暂无分享,去创建一个
[1] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[2] W. Richard Stevens,et al. TCP/IP Illustrated, Volume 2: The Implementation , 1995 .
[3] T. Chomsiri,et al. Architecture and Protocols for Secure LAN by Using a Software-Level Certificate and Cancellation of ARP Protocol , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[4] Bin Li,et al. Research of the ARP spoofing principle and a defensive algorithm , 2008 .
[5] Jungwoo Ryoo,et al. Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure , 2011, J. Comput. Sci. Eng..
[6] Chin-Tser Huang,et al. A secure address resolution protocol , 2003, Comput. Networks.
[7] Sukumar Nandi,et al. Detecting ARP Spoofing: An Active Technique , 2005, ICISS.
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Sangjun Lee,et al. Efficient Technique for Preventing ARP Spoofing Attacks using Reliable ARP Table , 2011 .