• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,206
Next 10 →

Security Problems in the TCP/IP Protocol Suite

by S. M. Bellovin , 1989
"... ..."
Abstract - Cited by 338 (15 self) - Add to MetaCart
Abstract not found

Implementation and Analyses of the Mobile-IP Protocol

by Fredrik Broman, Fredrik Tarberg - Thesis report for a masters degree in Computer Science at the Department of Teleinformatics , 1996
"... This report is the result of a masters degree project conducted at the Department of Teleinformatics at the Royal Institute of Technology during the autumn 1995. The area investigated is the Mobile Internet Protocol, especially its implementation and efficiency. The thesis work is divided into thre ..."
Abstract - Add to MetaCart
into three areas. The first area includes the development and implementation of a Management Information Base for the Mobile-IP protocol. The second area deals with the porting of a Mobile-IP implementation for SunOS to MachOS and Solaris. The last area covers the tests done to measure the throughput

Implementationand Analyses of the Mobile-IP Protocol

by Fredrik Broman, Fredrik Tarberg, Benjamin Franklin
"... This report is the result of a masters degree project conducted at the Department of Teleinformatics at the Royal Institute of Technology during the autumn 1995. The area investigated is the Mobile Internet Protocol, especially its implementation and efficiency. The thesis work is divided into three ..."
Abstract - Add to MetaCart
into three areas. The first area includes the development and implementation of a Management Information Base for the Mobile-IP protocol. The second area deals with the porting of a Mobile-IP implementation for SunOS to MachOS and Solaris. The last area covers the tests done to measure the throughput

Covert Channels in TCP/IP Protocol Stack

by Boris Panajotov, Aleksandra Mileva , 2013
"... We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. For every covert channel its data bandwidth is given. ..."
Abstract - Add to MetaCart
We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. For every covert channel its data bandwidth is given.

Analysis of Mobile IP Protocols Security

by Amit Gupta, Sumit Miglani, Maninder Singh
"... This paper describes the route optimization between Mobile IPv6 nodes which introduced several vulnerabilities in mobile environment. We first explain all the possible threats evolved due to route optimization technique and then possible defense mechanism to counter them. We have analyzed all that d ..."
Abstract - Add to MetaCart
that defense mechanism through comparative discussion and tried to find out best solution which may be more efficient and less complex. General Terms Security of mobile network, Analysis of mobile IP, Network design of mobile devices.

On the Security of the Mobile IP Protocol Family

by Ulrike Meyer, Hannes Tschofenig, Georgios Karagiannis, Mobile Ipv, Dual Stack Mipv, Proxy Mobile Ipv For
"... The Internet Engineering Task Force (IETF) has worked on network layer mobility for more than 10 years and a number of RFCs are available by now. Although the IETF mobility protocols are not present in the Internet infrastructure as of today, deployment seems to be imminent since a number of organiz ..."
Abstract - Add to MetaCart
The Internet Engineering Task Force (IETF) has worked on network layer mobility for more than 10 years and a number of RFCs are available by now. Although the IETF mobility protocols are not present in the Internet infrastructure as of today, deployment seems to be imminent since a number

Security Model for TCP/IP Protocol Suite

by M. Anand Kumar, Dr. S. Karthikeyan
"... Abstract—the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet. Internet usage continues to increase exponentially. So network security becomes a growing problem. Even though IPv6 comes with build ..."
Abstract - Add to MetaCart
Abstract—the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet. Internet usage continues to increase exponentially. So network security becomes a growing problem. Even though IPv6 comes with build

The Deisgn Philosophy of the DARPA Internet Protocols

by David D. Clark - In ACM SIGCOMM , 1988
"... The Intemet protocol suite, TCP/IP, was first proposed fifteen years ago, It was developed by the Defense Advanced Research Projects Agency (DARPA), and has been used widely in military and commercial systems. While there have been papers and specifications that describe how the protocols work, it i ..."
Abstract - Cited by 551 (2 self) - Add to MetaCart
The Intemet protocol suite, TCP/IP, was first proposed fifteen years ago, It was developed by the Defense Advanced Research Projects Agency (DARPA), and has been used widely in military and commercial systems. While there have been papers and specifications that describe how the protocols work

II. THE STRUCTURE OF THE LINUX TCP/IP PROTOCOL

by unknown authors
"... wide range of hardware, etc. It is popular because of its open source code and free available applications. The kernel of Linux supports a lot of CPU platforms, and it is a real multitask OS that provides virtual memory protection, demand loading and powerful network function. The network function i ..."
Abstract - Add to MetaCart
is a very important part of the Linux kernel. More then 30 % of the Web server on the Internet are constructed on Linux. The network function of Linux has the following characteristics: it provides BSD SOCKET interface for user applications, it supports network protocols such as IP, IPX, AppleTalk, X

Security Analysis of Voice-over-IP Protocols

by Prateek Gupta And, Prateek Gupta, Vitaly Shmatikov
"... Transmission of voice communications as datagram packets over IP networks, commonly known as Voice-over-IP (VoIP) telephony, is rapidly gaining wide acceptance. With private phone conversations being conducted on insecure public networks, security of VoIP communications is increasingly important. ..."
Abstract - Add to MetaCart
. We present a structured security analysis of the VoIP protocol stack, which consists of signaling (SIP), session description (SDP), key establishment (SDES, MIKEY, and ZRTP) and secure media transport (SRTP) protocols. Using a combination of manual and tool-supported formal analysis, we uncover
Next 10 →
Results 1 - 10 of 8,206
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University