Given the importance of privacy, many Internet protocols are nowadays designed with privacy in mind (eg, using TLS for confidentiality). Foreseeing all privacy issues at the time of …
L Li, G Ren, Y Liu, J Wu - Tsinghua Science and Technology, 2018 - ieeexplore.ieee.org
With the rapid developmen of the Internet, the exhaustion of IPv4 address limited the development of the Internet for years. IPv6, as the core technology of the next generation …
M Dunlop, S Groat, RC Marchany, JG Tront - 2012 - vtechworks.lib.vt.edu
The goal of our research is to protect sensitive communications, which are commonly used by government agencies, from eavesdroppers or social engineers. In prior work, we …
L Polčák, M Holkovič… - … Conference on Data …, 2013 - ieeexplore.ieee.org
For security, management and accounting, network administrators benefit from knowledge of IP and MAC address bindings. In IPv6, learning these bindings is not as straightforward as it …
The security of powerful systems and large networks is often addressed through complex defenses. While these types of defenses offer increased security, they are resource intensive …
Society's increased use of network applications, such as email, social networking, and web browsing, creates a massive amount of information floating around in cyber space. An …
L Polčák, M Holkovič, P Matoušek - … 2013, Reykjavik, Iceland, July 29-31 …, 2014 - Springer
It is important to keep networks secure and reliable. In order to backtrack security incidents, provide accounting for offered services etc., it is necessary to know the identity of network …
Internet has became a regular communication channel between law offenders performing malicious activities. Courts or prosecutors authorise lawful interception that targets individual …
L Polčák - ICETE 2014 Doctoral Consortium, 2014 - scitepress.org
The knowledge of user identity is a necessity for many network-related tasks, eg network management (Grégr et al., 2011), security incident backtracking (Scarfone et al., 2008) …