End hopping based on message tampering

The main theoretical and technical problems were studied in the application of end hopping,and the idea of message tampering was proposed and the model of end hopping stack was built upon it.Three feasible implementations for the end hopping and discuss their advantages and disadvantages were respec...

Full description

Saved in:
Bibliographic Details
Main Authors: Kai LIN, Chun-fu JIA
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-12-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/thesisDetails#10.3969/j.issn.1000-436X.2013.12.016
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850211809605189632
author Kai LIN
Chun-fu JIA
author_facet Kai LIN
Chun-fu JIA
author_sort Kai LIN
collection DOAJ
description The main theoretical and technical problems were studied in the application of end hopping,and the idea of message tampering was proposed and the model of end hopping stack was built upon it.Three feasible implementations for the end hopping and discuss their advantages and disadvantages were respectively provided.And the experiment re-sult shows the potential application of the message tampering and the end hopping stack model in practice.
format Article
id doaj-art-0c0b313926d040bdb97cd4ebce9da3c7
institution OA Journals
issn 1000-436X
language zho
publishDate 2013-12-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-0c0b313926d040bdb97cd4ebce9da3c72025-08-20T02:09:29ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-12-013414214859676582End hopping based on message tamperingKai LINChun-fu JIAThe main theoretical and technical problems were studied in the application of end hopping,and the idea of message tampering was proposed and the model of end hopping stack was built upon it.Three feasible implementations for the end hopping and discuss their advantages and disadvantages were respectively provided.And the experiment re-sult shows the potential application of the message tampering and the end hopping stack model in practice.http://www.joconline.com.cn/thesisDetails#10.3969/j.issn.1000-436X.2013.12.016network security;denial of service attack;end hopping technology;message tampering
spellingShingle Kai LIN
Chun-fu JIA
End hopping based on message tampering
Tongxin xuebao
network security;denial of service attack;end hopping technology;message tampering
title End hopping based on message tampering
title_full End hopping based on message tampering
title_fullStr End hopping based on message tampering
title_full_unstemmed End hopping based on message tampering
title_short End hopping based on message tampering
title_sort end hopping based on message tampering
topic network security;denial of service attack;end hopping technology;message tampering
url http://www.joconline.com.cn/thesisDetails#10.3969/j.issn.1000-436X.2013.12.016
work_keys_str_mv AT kailin endhoppingbasedonmessagetampering
AT chunfujia endhoppingbasedonmessagetampering