Back to the Future: Revisiting IPv6 Privacy Extensions
暂无分享,去创建一个
Paul C. van Oorschot | David Barrera | Glenn Wurster | P. V. Oorschot | David Barrera | Glenn Wurster
[1] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[2] Karine Perset. Internet Addressing: Measuring Deployment of IPV6 , 2010 .
[3] George Neville-Neil,et al. Deprecation of Type 0 Routing Headers in IPv6 , 2007, RFC.
[4] Saikat Guha,et al. Identity Trail: Covert Surveillance Using DNS , 2007, Privacy Enhancing Technologies.
[5] Bart Preneel,et al. On the Security of Iterated Message Authentication Codes , 1999, IEEE Trans. Inf. Theory.
[6] Charles E. Perkins,et al. Mobility support in IPv6 , 1996, MobiCom '96.
[7] David M. Kristol,et al. HTTP State Management Mechanism , 2000, RFC.
[8] Suresh Krishnan,et al. Handling of Overlapping IPv6 Fragments , 2009, RFC.
[9] T. Narten,et al. Privacy Extensions for Stateless Address Autoconfiguration , 2001 .
[10] Bruce S. Davie,et al. Computer Networks: A Systems Approach , 1996 .
[11] Jon Postel,et al. Internet Protocol , 1981, RFC.
[12] Thomas Narten,et al. IPv6 Stateless Address Autoconfiguration , 1996, RFC.
[13] Thomas Narten,et al. Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2001, RFC.
[14] Tuomas Aura,et al. Cryptographically Generated Addresses (CGA) , 2005, ISC.
[15] Stephen Deering,et al. Internet Protocol Version 6(IPv6) , 1998 .
[16] Jari Arkko,et al. Enhanced Route Optimization for Mobile IPv6 , 2007, RFC.
[17] Steven M. Bellovin,et al. ROFL: routing as the firewall layer , 2009, NSPW '08.
[18] Bill Cheswick,et al. Worm Propagation Strategies in an IPv6 Internet , 2006, login Usenix Mag..
[19] Jürgen Falb,et al. The Internet Protocol , 2005, The Industrial Information Technology Handbook.
[20] Paul C. van Oorschot,et al. Internet geolocation: Evasion and counterevasion , 2009, CSUR.
[21] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[22] Hugo Krawczyk,et al. Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier , 1999, CRYPTO.
[23] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[24] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .