Citation to this article as recorded by
Al-Alak S., Z. Zukranian, A. Abdullah and S. Subramiam, 2012. Authentication time of IEEE 802.15.4 with multiple-key protocol using distributed message authentication code algorithm. Res. J. Inform. Technol., 4: 140-154. CrossRefDirect Link |
Bahaman, N., A.S. Prabuwono, M.Z. Mas'ud and M.F. Abdollah, 2012. Effectiveness of security tools to anomalies on tunneled traffic. Inform. Technol. J., 11: 191-199. CrossRefDirect Link |
Bahaman, N., A.S. Prabuwono, R. Alsaqour and M.Z. Masud, 2012. Network performance evaluation of tunneling mechanism. J. Applied Sci., 12: 459-465. CrossRef |
Citation to this article as recorded by
Effectiveness of Security Tools to Anomalies on Tunneled Traffic Information Technology Journal Vol. 11, Issue 2, 191, 2012 |
How to cite this article
L.T. Lee and C.W. Chen, 2008. The Web Services with Security Mechanisms Base on IPv4 and IPv6. Information Technology Journal, 7: 1188-1193.
DOI: 10.3923/itj.2008.1188.1193
URL: https://scialert.net/abstract/?doi=itj.2008.1188.1193
DOI: 10.3923/itj.2008.1188.1193
URL: https://scialert.net/abstract/?doi=itj.2008.1188.1193