The Community for Technology Leaders
RSS Icon
Issue No.01 - Jan.-Feb. (2014 vol.18)
pp: 88
This column deals with Internet security and steps that can be taken to improve resistance to various forms of attack, surveillance, mis-routing and improper buffer sizing. A variety of technical remedies are outlined. IPv6 is also addressed as an important feature whose adoption needs to be accelerated along with dual-stack IPv4/IPv6 capability, especially in residential settings.
Internet, Computer security, Computer crime,man-in-the-middle attack, Internet security, cryptography, buffer bloat, DNSSEC, domain name system, public key cryptography, CODEL
Vinton G. Cerf, "Unfinished Business", IEEE Internet Computing, vol.18, no. 1, pp. 88, Jan.-Feb. 2014, doi:10.1109/MIC.2014.18
60 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool