A Monthly Double-blind Peer Reviewed Refereed Open Access International E-journal -included in the International Serial Directories International Journal of Management, It and Engineering Data Security in the Transition from Ipv4 to Ipv6 ___________________________________________________________ a
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[2] Pekka Savola,et al. Security Considerations for 6to4 , 2004, RFC.
[3] Elwyn B. Davies,et al. IPv6 Transition/Co-existence Security Considerations , 2007, RFC.
[4] Donald E. Eastlake rd. Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH) , 2005 .
[5] Ralph Droms,et al. Dual-stack lite broadband deployments post IPv4 exhaustion , 2008 .
[6] Sean Convery. IPv6 and IPv4 Threat Comparison and Best- Practice Evaluation (v1.0) , 2004 .
[7] Gaeil An,et al. Effective Control of Abnormal Neighbor Discovery Congestion on IPv6 Local Area Network , 2006, UIC.
[8] Pekka Savola,et al. Security of IPv6 Routing Header and Home Address Options , 2002 .
[9] Thomas Narten,et al. Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2001, RFC.
[10] Erik Nordmark,et al. Basic Transition Mechanisms for IPv6 Hosts and Routers , 2005, RFC.
[11] Vincent Rijmen,et al. Update on SHA-1 , 2005, CT-RSA.
[12] Pekka Nikander,et al. Threat Models introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6 , 2001 .
[13] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[14] Eric Vyncke,et al. IPv6 Security , 2008 .