Back to Results
First PageMeta Content
Computer network security / Network protocols / IPv6 / Cyberwarfare / Mobile IP / Proxy Mobile IPv6 / IP address spoofing / Transmission Control Protocol / IPsec / Network architecture / Computing / Internet Protocol


Security of Internet Location Management Tuomas Aura and Michael Roe Microsoft Research 7 J J Thomson Avenue, Cambridge CB3 0FB, UK {tuomaura,mroe}@microsoft.com Abstract
Add to Reading List

Document Date: 2010-08-20 09:24:21


Open Document

File Size: 87,96 KB

Share Result on Facebook

City

Mordano / Oakland / Cambridge / Beijing / San Diego / /

Company

IEEE Computer Society Press / IETF Mobile IP Working Group / IEEE Computer / Ericsson / Microsoft / /

Country

United Kingdom / China / Italy / /

/

Event

FDA Phase / Natural Disaster / /

IndustryTerm

Internet nodes / generic authentication solutions / mobility protocol / Internet protocols / low-end mobile devices / update authentication protocol / sessionkey management protocol / Internet Drafts / media types / weakest standardized protocol / Internet mobility protocol / target network / public web site / Internet mobility protocols / Internet traffic / upper protocol / acceptable protocols / puzzle protocols / arbitrary Internet nodes / Internet Protocol / Web server / secure location management protocol / generic authentication protocols / security infrastructure / Internet-draft / authentication protocol / few dozen routers / publickey algorithms / network-layer signaling protocol / transport-layer protocols / Internet mobility / ingress filtering in as many networks / public-key infrastructure / mobility protocols / communications bandwidth / location management protocols / cryptographic authentication protocol / storage technology / stateful protocol / trust infrastructure / location management / natural solution / Internet-Draft draft-roe-mobileip-updateauth02.txt / equal processing power / transport protocols / public-key protocols / location management protocol / Internet node / Internet location management protocols / Internet Location Management Tuomas Aura / obvious solution / e.g. bruteforce search / gateway router / Internet node moves / mobile and stationary Internet nodes / authentication protocols / wireless mobile / stronger protocol / /

OperatingSystem

DoS / /

Organization

Internet Society / IEEE Computer Society / /

Person

Phil Karn / Markus G. Kuhn / David B. Johnson / Michael Roe / Erik Nordmark / Eugene H. Spaffold / Jari Arkko / Thomas Narten / Ivan V. Krsul / Yakov Rekhter / Daniel Senie / Susan Thomson / Aurobindo Sundaram / Charles Perkins / Catherine Meadows / Robert M. Hinden / Randall Atkinson / Tuomas Aura / Christoph L. Schuba / Claude Castelluccia / Paul Ferguson / Richard Draves / Stephen Kent / William Allen Simpson / Ari Juels / Diego Zamboni / Greg O'Shea / John Brainard / Donald E. Eastlake / Stephen E. Deering / William A. Simpson / Paul Vixie / /

Position

tackle / Favoring Regular Customers The correspondent / correspondent / /

Product

BUauthentication / one / MIPv6 / AN97 / MC02 / Mobile / IPv6 / OR01 / /

Technology

few dozen routers / gateway router / location management protocols / stateful protocol / MIPv6 binding update authentication protocol / PKI / compromised routers / BU authentication protocols / Security Protocols / secret key / Internet location management protocols / generic authentication protocols / mobility protocol / transport protocols / weakest standardized protocol / mobile devices / encryption / cryptographic authentication protocol / Internet mobility protocol / IPv6 Protocol / cryptography / CGA-based protocols / Mobile IPv6 protocol / location management protocol / storage technology / routing-based authentication protocol / Flow Control / authentication protocols / Consuming Authentication Resources Authentication protocols / home network / authentication protocol / stronger protocol / IPv6 / IP / transport-layer protocols / sessionkey management protocol / Internet protocols / private key / BU protocol / SSL / puzzle protocols / public-key infrastructure / alternative mobility protocols / network-layer signaling protocol / Internet mobility protocols / public-key protocols / public key / DNS / firewall / BUauthentication protocol / secure location management protocol / IPv4 / BU authentication protocol / MIPv6 protocol / mobility protocols / MIPv6 BU authentication protocol / Web server / publickey algorithms / using puzzle protocols / /

SocialTag