This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Jan.-Feb. 2014 (vol. 18 no. 1)
pp. 88
This column deals with Internet security and steps that can be taken to improve resistance to various forms of attack, surveillance, mis-routing and improper buffer sizing. A variety of technical remedies are outlined. IPv6 is also addressed as an important feature whose adoption needs to be accelerated along with dual-stack IPv4/IPv6 capability, especially in residential settings.
Index Terms:
Internet,Computer security,Computer crime,man-in-the-middle attack,Internet security,cryptography,buffer bloat,DNSSEC,domain name system,public key cryptography,CODEL
Citation:
Vinton G. Cerf, "Unfinished Business," IEEE Internet Computing, vol. 18, no. 1, pp. 88, Jan.-Feb. 2014, doi:10.1109/MIC.2014.18
Usage of this product signifies your acceptance of the Terms of Use.