Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 채기준 | * |
dc.date.accessioned | 2016-08-28T11:08:34Z | - |
dc.date.available | 2016-08-28T11:08:34Z | - |
dc.date.issued | 2006 | * |
dc.identifier.isbn | 8955191294 | * |
dc.identifier.isbn | 9788955191295 | * |
dc.identifier.other | OAK-12906 | * |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/228968 | - |
dc.description.abstract | When IPv6 were defined, it was assumed that the local link would consist of mutually trusting nodes. Even though the actual link may still be somewhat protected with layer2 security, some of the nodes on the link nay be untrustworthy because of leading to various kinds of access stealing, DoS, and traffic snooping attacks. In this paper we suggest comparisons analysis of security vulnerabilities for security enforcement in IPv4 and IPv6. | * |
dc.language | English | * |
dc.title | Comparisons analysis of security vulnerabilities for security enforcement in IPv4/IPv6 | * |
dc.type | Conference Paper | * |
dc.relation.volume | 3 | * |
dc.relation.index | SCOPUS | * |
dc.relation.startpage | 1583 | * |
dc.relation.lastpage | 1585 | * |
dc.relation.journaltitle | 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings | * |
dc.identifier.scopusid | 2-s2.0-33750944173 | * |
dc.author.google | Oh H. | * |
dc.author.google | Chae K. | * |
dc.author.google | Bang H. | * |
dc.author.google | Na J. | * |
dc.contributor.scopusid | 채기준(7102584247) | * |
dc.date.modifydate | 20240322133135 | * |