A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
スポンサーリンク
概要
- 論文の詳細を見る
- 2009-06-01
著者
-
HORI Yoshiaki
Dept. of Computer Science and Communication Engineering, Kyushu University
-
SAKURAI Kouichi
Dept. of Computer Science and Communication Engineering, Kyushu University
-
Sakurai Kouichi
Kyushu Univ. Fukuoka‐shi Jpn
-
YOU Ilsun
School of Information Science, Korean Bible University
-
Hori Yoshiaki
Dept. Of Computer Science And Communication Engineering Kyushu University
-
You Ilsun
School Of Information Science Korean Bible University
-
Sakurai Kouichi
Dept. Of Computer Science And Communication Engineering Kyushu University
-
Sakurai Kouichi
Information Technology And Security Group Department Of Computer Science And Communication Engineeri
関連論文
- ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- Analysis of Existing Privacy-Preserving Protocols in Domain Name System
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- Reliable Key Distribution Scheme for Lossy Channels
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- ESS-FH : Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- An Enhanced Security Protocol for Fast Mobile IPv6
- A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Modeling Security Bridge Certificate Authority Architecture
- An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
- Analysis of Existing Privacy-Preserving Protocols in Domain Name System
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- FOREWORD
- Economic-inspired truthful reputation feedback mechanism in P2P networks
- On securing open networks through trust and reputation-architecture, challenges and solutions
- Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
- Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
- Private Data Clustering based on Secure Approximation
- Special Section on Cryptography and Information Security
- Transport Layer Mobility Management across Heterogeneous Wireless Access Networks(Network)
- New TCP Congestion Control Schemes for Multimodal Mobile Hosts(Terrestrial Radio Communications)
- Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
- Improved Subset Difference Method with Ternary Tree
- Timing Attacks against a Parallelized RSA Implementation (特集:プライバシを保護するコンピュータセキュリティ技術)
- A Progress Report on Lattice Based Public-Key Cryptosystems : Theoretical Security versus Practical Cryptanalysis(Special Issue on Algorithm Engineering : Surveys)