View : 575 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author채기준*
dc.date.accessioned2016-08-28T11:08:34Z-
dc.date.available2016-08-28T11:08:34Z-
dc.date.issued2006*
dc.identifier.isbn8955191294*
dc.identifier.isbn9788955191295*
dc.identifier.otherOAK-12906*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/228968-
dc.description.abstractWhen IPv6 were defined, it was assumed that the local link would consist of mutually trusting nodes. Even though the actual link may still be somewhat protected with layer2 security, some of the nodes on the link nay be untrustworthy because of leading to various kinds of access stealing, DoS, and traffic snooping attacks. In this paper we suggest comparisons analysis of security vulnerabilities for security enforcement in IPv4 and IPv6.*
dc.languageEnglish*
dc.titleComparisons analysis of security vulnerabilities for security enforcement in IPv4/IPv6*
dc.typeConference Paper*
dc.relation.volume3*
dc.relation.indexSCOPUS*
dc.relation.startpage1583*
dc.relation.lastpage1585*
dc.relation.journaltitle8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings*
dc.identifier.scopusid2-s2.0-33750944173*
dc.author.googleOh H.*
dc.author.googleChae K.*
dc.author.googleBang H.*
dc.author.googleNa J.*
dc.contributor.scopusid채기준(7102584247)*
dc.date.modifydate20240322133135*
Appears in Collections:
인공지능대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE