End hopping based on message tampering
The main theoretical and technical problems were studied in the application of end hopping,and the idea of message tampering was proposed and the model of end hopping stack was built upon it.Three feasible implementations for the end hopping and discuss their advantages and disadvantages were respec...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2013-12-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.3969/j.issn.1000-436X.2013.12.016 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850211809605189632 |
|---|---|
| author | Kai LIN Chun-fu JIA |
| author_facet | Kai LIN Chun-fu JIA |
| author_sort | Kai LIN |
| collection | DOAJ |
| description | The main theoretical and technical problems were studied in the application of end hopping,and the idea of message tampering was proposed and the model of end hopping stack was built upon it.Three feasible implementations for the end hopping and discuss their advantages and disadvantages were respectively provided.And the experiment re-sult shows the potential application of the message tampering and the end hopping stack model in practice. |
| format | Article |
| id | doaj-art-0c0b313926d040bdb97cd4ebce9da3c7 |
| institution | OA Journals |
| issn | 1000-436X |
| language | zho |
| publishDate | 2013-12-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-0c0b313926d040bdb97cd4ebce9da3c72025-08-20T02:09:29ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-12-013414214859676582End hopping based on message tamperingKai LINChun-fu JIAThe main theoretical and technical problems were studied in the application of end hopping,and the idea of message tampering was proposed and the model of end hopping stack was built upon it.Three feasible implementations for the end hopping and discuss their advantages and disadvantages were respectively provided.And the experiment re-sult shows the potential application of the message tampering and the end hopping stack model in practice.http://www.joconline.com.cn/thesisDetails#10.3969/j.issn.1000-436X.2013.12.016network security;denial of service attack;end hopping technology;message tampering |
| spellingShingle | Kai LIN Chun-fu JIA End hopping based on message tampering Tongxin xuebao network security;denial of service attack;end hopping technology;message tampering |
| title | End hopping based on message tampering |
| title_full | End hopping based on message tampering |
| title_fullStr | End hopping based on message tampering |
| title_full_unstemmed | End hopping based on message tampering |
| title_short | End hopping based on message tampering |
| title_sort | end hopping based on message tampering |
| topic | network security;denial of service attack;end hopping technology;message tampering |
| url | http://www.joconline.com.cn/thesisDetails#10.3969/j.issn.1000-436X.2013.12.016 |
| work_keys_str_mv | AT kailin endhoppingbasedonmessagetampering AT chunfujia endhoppingbasedonmessagetampering |