Design of FPGA Hardware Accelerator for Information Security System
نویسندگان
چکیده
منابع مشابه
simulation and design of electronic processing circuit for restaurants e-procurement system
the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...
15 صفحه اولDesign of Network Security Devices with Hardware Compilation and FPGA Development System --- Extended Abstract
Embedded network security devices are on the increase as purely software approaches cannot cope with existing packet throughputs, let alone high-performance LANs such as Gb Ethernet. For example, Sourcefire Inc., well known for Snort --a rule-based software search engine, have turned to an intrusion detection system (IDS) using up to ten G5 PowerPC processors aimed at fibre-optic line-rates of ...
متن کاملProject of IPv6 Router with FPGA Hardware Accelerator
Packet processing is pipelined. A packet flows through the FPGA and memories. An incoming packet is received by the Input Packet Buffer and passed to the Header Field Extractor. The HFE pushes the body of the packet into the dynamic memory. Meanwhile, it parses its headers and creates a Unified-header and a structure reflecting actual arrangement of the headers. The Unified-header is a fixed st...
متن کاملThree-Dimensional Ultrasound Imaging Utilizing Hardware Accelerator Based on FPGA
We have developed a 3D ultrasound imaging system involving computations for use in medical diagnostic applications [1,2]. This system enables us to observe 3D images of moving objects for each transmission. Therefore, we can acquire a 3D image sequence at a high frame rate. Fig. 1 shows a 3D image reconstructed by our 3D ultrasound imaging system. In the pork block, a needle is inserted as a ma...
متن کاملHardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security
Protecting data and its communication is a critical part of the modern network. The science of protecting data, known as cryptography, uses secret keys to encrypt data in a format that is not easily decipherable. However,most commonly secure logons for a workstation connected to a network use passwords to perform user authentication. These passwords are a weak link in the security chain, and ar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Industrial Information System Society
سال: 2013
ISSN: 1229-3741
DOI: 10.9723/jksiis.2013.18.2.001