End hopping based on message tampering

The main theoretical and technical problems were studied in the application of end hopping,and the idea of message tampering was proposed and the model of end hopping stack was built upon it.Three feasible implementations for the end hopping and discuss their advantages and disadvantages were respec...

Full description

Saved in:
Bibliographic Details
Main Authors: Kai LIN, Chun-fu JIA
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-12-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.12.016/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850095625831448576
author Kai LIN
Chun-fu JIA
author_facet Kai LIN
Chun-fu JIA
author_sort Kai LIN
collection DOAJ
description The main theoretical and technical problems were studied in the application of end hopping,and the idea of message tampering was proposed and the model of end hopping stack was built upon it.Three feasible implementations for the end hopping and discuss their advantages and disadvantages were respectively provided.And the experiment re-sult shows the potential application of the message tampering and the end hopping stack model in practice.
format Article
id doaj-art-76cc5fbc0c42402784cbff8999c4e610
institution DOAJ
issn 1000-436X
language zho
publishDate 2013-12-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-76cc5fbc0c42402784cbff8999c4e6102025-08-20T02:41:24ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-12-013414214859676582End hopping based on message tamperingKai LINChun-fu JIAThe main theoretical and technical problems were studied in the application of end hopping,and the idea of message tampering was proposed and the model of end hopping stack was built upon it.Three feasible implementations for the end hopping and discuss their advantages and disadvantages were respectively provided.And the experiment re-sult shows the potential application of the message tampering and the end hopping stack model in practice.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.12.016/network securitydenial of service attackend hopping technologymessage tampering
spellingShingle Kai LIN
Chun-fu JIA
End hopping based on message tampering
Tongxin xuebao
network security
denial of service attack
end hopping technology
message tampering
title End hopping based on message tampering
title_full End hopping based on message tampering
title_fullStr End hopping based on message tampering
title_full_unstemmed End hopping based on message tampering
title_short End hopping based on message tampering
title_sort end hopping based on message tampering
topic network security
denial of service attack
end hopping technology
message tampering
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.12.016/
work_keys_str_mv AT kailin endhoppingbasedonmessagetampering
AT chunfujia endhoppingbasedonmessagetampering