Results 91 to 100 of about 14,435 (215)

Assessing a Methodology for Evaluating the Latency of IPv6 with SCHC Compression in LoRaWAN Deployments. [PDF]

open access: yesSensors (Basel), 2023
Sisinni E   +7 more
europepmc   +1 more source

Secure Multicast Group Communication Scheme in Wireless IPv6 Networks

open access: diamond, 1970
Abbas Mehdizadeh   +2 more
openalex   +2 more sources

Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management [PDF]

open access: green, 2004
I. Vivaldi   +3 more
openalex   +1 more source

IPv6 Opportunistic Encryption

open access: yes, 2002
This paper presents an Opportunistic Encryption scheme for IPv6. Our proposal relies on IPv6 Anycast, Authorization certificates and Crypto-Based Identifier- s (CBID) to provide secure and easily deployable Opportunistic Encryption in IPv6. Unlike existing schemes, our proposal does not rely on any global Third Trusted Party (such as DNSSEC or a PKI ...
Castelluccia, Claude   +1 more
openaire   +1 more source

In-line service measurements: an IPv6-based framework for traffic evaluation and network operations [PDF]

open access: green, 2004
Dimitrios P. Pezaros   +4 more
openalex   +1 more source

SEUI-64, bits an IPv6 addressing strategy to mitigate reconnaissance attacks

open access: yesEngineering Science and Technology, an International Journal, 2019
It has been widely assumed by the research community that the network reconnaissance attacks in IPv6 networks are unfeasible because they would take tremendous effort to perform address scanning of 264 hosts in an IPv6 subnet.
Shubair A. Abdullah
doaj  

Home - About - Disclaimer - Privacy