Gouda, Mohamed G.
Hop Integrity in the Internet
1. Introduction
2. Abstract Protocol Notation
3. Abstract Secure Protocols
4. Denial-of-Service Attacks
5. Secure Address Resolution Protocol
6. Weak Hop Integrity Protocol
7. Strong Hop Integrity Using Soft Sequence Numbers
8. Strong Hop Integrity Using Hard Sequence Numbers
9. Implementation Considerations
10. Other Uses of Hop Integrity
DRM-restrictions
Printing: not available
Clipboard copying: not available
Keywords: COMPUTERS / Computer Science COM014000
- Author(s)
- Gouda, Mohamed G.
- Huang, Chin-Tser
- Publisher
- Springer
- Publication year
- 2006
- Language
- en
- Edition
- 1
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9780387294445