共 50 条
- [1] Support mobile IPv6 in IPv4 domains [J]. VTC2004-SPRING: 2004 IEEE 59TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, PROCEEDINGS, 2004, : 2700 - 2704
- [2] Implementation of Route Optimization Mechanism Supporting IPv4/IPv6 Traversal in Proxy Mobile IPv6 [J]. 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1242 - 1244
- [3] Security Enhancement on an Authentication Method for Proxy Mobile IPv6 [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 412 - 415
- [4] Security Enhancement on an Authentication Method for Proxy Mobile IPv6 [J]. PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 345 - +
- [5] Security analysis and enhanced user authentication in proxy mobile IPv6 networks [J]. PLOS ONE, 2017, 12 (07):
- [6] Security mechanisms for the IPv4 to IPv6 transition [J]. 2007 5TH STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT, 2007, : 336 - +
- [7] IPV4/IPV6 security and threat comparisons [J]. INNOVATION AND CREATIVITY IN EDUCATION, 2010, 2 (02): : 5285 - 5291
- [8] Comparisons analysis of security vulnerabilities for security enforcement in IPv4/IPv6 [J]. 8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1583 - U1585
- [9] Security Analysis of Session Initiation Protocol in IPv4 and IPv6 based VoIP network [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 187 - 192
- [10] A traffic analysis of authentication methods for proxy mobile IPv6 [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 512 - 517