Incentive Approach to The Active Network Privacy Threats and Vulnerabilities
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F10%3APU97872" target="_blank" >RIV/00216305:26230/10:PU97872 - isvavai.cz</a>
Result on the web
<a href="http://www.sersc.org/journals/JSE/vol7_no6_2010/3.pdf" target="_blank" >http://www.sersc.org/journals/JSE/vol7_no6_2010/3.pdf</a>
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Incentive Approach to The Active Network Privacy Threats and Vulnerabilities
Original language description
This paper scrutinizes an active network scenario and proposes an efficient dual authentication key exchanged. The scheme protects personal privacy of identity information. It also provides an effective method to protect against DOS attacks with the scope information of initiator's random number table sent by the responder.
Czech name
—
Czech description
—
Classification
Type
J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
<a href="/en/project/FR-TI1%2F392" target="_blank" >FR-TI1/392: *Multimedia and wireless extension intelligent electroinstalation INELS</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2010
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
Journal of Security Engineering
ISSN
1738-7531
e-ISSN
—
Volume of the periodical
7
Issue of the periodical within the volume
6
Country of publishing house
KR - KOREA, REPUBLIC OF
Number of pages
14
Pages from-to
585-598
UT code for WoS article
—
EID of the result in the Scopus database
—