IP addresses and data protection

被引:0
|
作者
Sury, Ursula
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:181 / 183
相关论文
共 50 条
  • [41] Resource Certification - A Public Key Infrastructure for IP Addresses and AS's
    Huston, Geoff
    Michaelson, George
    Kent, Stephen
    2009 IEEE GLOBECOM WORKSHOPS, 2009, : 250 - +
  • [42] Use of IP Addresses for High Rate Flooding Attack Detection
    Ahmed, Ejaz
    Mohay, George
    Tickle, Alan
    Bhatia, Sajal
    SECURITY AND PRIVACY - SILVER LININGS IN THE CLOUD, 2010, 330 : 124 - 135
  • [43] Application for Determining whether IP Addresses belong to a Map by Coordinates
    Oujezsky, Vaclav
    Horvath, Tomas
    Munster, Petr
    2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2019, : 14 - 18
  • [44] Effective IP protection method of mask data using OASIS format
    Nishizawa, K
    Endo, M
    Kato, K
    Photomask and Next-Generation Lithography Mask Technology XII, Pts 1 and 2, 2005, 5853 : 634 - 642
  • [45] Mobile IP network supporting private IP addresses utilizing regional registration and NAT function
    Idoue, A
    Yokota, H
    Kato, T
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, : 141 - 146
  • [46] Adaptive Addresses for Next Generation IP Protocol in Hierarchical Networks
    Song, Haoyu
    Zhang, Zhaobo
    Qu, Yingzhen
    Guichard, James
    2020 IEEE 28TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP 2020), 2020,
  • [47] IP addresses auto-configuration in global IP connectivity of mobile ad hoc networks
    Li, R
    Ye, XM
    Shi, JL
    Sun, JM
    Wang, HH
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 479 - 484
  • [48] Detecting Third-party Addresses in Traceroute IP Paths
    Marchetta, Pietro
    de Donato, Walter
    Pescape, Antonio
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (04) : 109 - 110
  • [49] Safety Considerations for Configuring LXI-based ATE Systems When IP Addresses Become Logical Addresses
    Headrick, William J.
    Correll, Kendall
    Sarfi, Tom
    2009 IEEE AUTOTESTCON, 2009, : 54 - +
  • [50] IP protection and restoration
    Metz, C
    IEEE INTERNET COMPUTING, 2000, 4 (02) : 97 - 102