Issue No. 01 - Jan.-Feb. (2014 vol. 18)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MIC.2014.18
Vinton G. Cerf , Google
This column deals with Internet security and steps that can be taken to improve resistance to various forms of attack, surveillance, mis-routing and improper buffer sizing. A variety of technical remedies are outlined. IPv6 is also addressed as an important feature whose adoption needs to be accelerated along with dual-stack IPv4/IPv6 capability, especially in residential settings.
Internet, Computer security, Computer crime,man-in-the-middle attack, Internet security, cryptography, buffer bloat, DNSSEC, domain name system, public key cryptography, CODEL
Vinton G. Cerf, "Unfinished Business", IEEE Internet Computing, vol. 18, no. , pp. 88, Jan.-Feb. 2014, doi:10.1109/MIC.2014.18