Computer Science ›› 2008, Vol. 35 ›› Issue (1): 64-66.
Previous Articles Next Articles
Online:
Published:
Abstract: Vulnerabilities in the ARP protocol became a threat to TCP/IP security. Countermeasures to these vulnera- bilities based on Symmetric-Key Cryptography or Asymmetric-Key Cryptography are proposed recently. In the present paper, the principle of ARP attacks
Key words: ARP, Secure ARP, Clark-Wilson model, Integrity
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I1/64
Cited