نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

2010
I. Nai Fovino

The security of Critical Infrastructures has become a prominent problem with the advent of modern ICT technologies used to improve the performance and the features of Process Control Systems. Several scientific works have showed how Supervisory Control And Data Acquisition Systems (SCADA), i.e. the systems that control industrial installations, are exposed to cyber-attacks. Traditional ICT secu...

Journal: :مطالعات حقوق خصوصی 0
علیرضا پوراسماعیلی استادیار گروه حقوق دانشکدۀ الهیات و معارف اسلامی دانشگاه حکیم سبزواری عبدالحسین شیروی استاد گروه حقوق خصوصی دانشکدۀ حقوق و علوم سیاسی دانشگاه تهران

attracting foreign investment is a technique to achieve economic development, which requires establishment of appropriate legal and administrative infrastructure. in addition, host countries may ignore their public interest and national security. therefore, they have to maintain a balance between economic development and protection of national security. the concern over the national security as...

1998
Yoshiyuki Tsuda Masahiro Ishiyama Atsushi Fukumoto Atsushi Inoue

As the commercial use of the Internet becomes common and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system: "Network CryptoGate (NCG)", which employs the IETF/Mobile IP and the IETF/IP security on stationary security gateways (NCG servers) and mobile hosts (NC...

2017
Fareena Saqib Jim Plusquellic

Hardware obfuscation is a technique to conceal the design frommalicious insider and outsider adversaries. Obfuscation techniques transform the original design such that the obfuscated version is functionally equivalent to the original design, but it does not reveal the design details and is much harder to reverse-engineer [1]. As discussed earlier in Chap.1, the business model of distributed an...

2012
E. Bijolin Edwin Dr. P. Uma Maheswari M. Roshni Thanka

Cloud computing is a natural extension of virtualisation technologies that enable scalable management of virtual machines over a massive physically connected systems. The virtualisation-based cloud computing paradigm offers a practical approach to green IT/clouds, which emphasise the construction and deployment of scalable, energy-efficient network software applications (NetApp) by virtue of im...

2017
Qutaiba Alasad Yu Bi

The outsourcing of integrated circuit (IC) fabrication services to overseas manufacturing foundry has raised security and privacy concerns with regard to intellectual property (IP) protection as well as the integrity maintenance of the fabricated chips. One way to protect ICs from malicious attacks is to encrypt and obfuscate the IP design by incorporating additional key gates, namely logic enc...

2003
Henry C. J. Lee Vrizlynn L. L. Thing Yi Xu Miao Ma

DoS/DDoS attacks constitute one of the major classes of security threats in the Internet today. The attackers usually use IP spoofing to conceal their real location. The current Internet protocols and infrastructure do not provide intrinsic support to traceback the real attack sources. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the a...

Journal: :Wireless Personal Communications 2011
Tobias Heer Óscar García-Morchón René Hummen Sye Loong Keoh Sandeep S. Kumar Klaus Wehrle

A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thingto-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and li...

2003
Ann-Tzung Cheng Chun-Hsin Wu Jan-Ming Ho D. T. Lee

In this paper we discuss the issues of wireless mobile networks for intelligent transportation systems (ITS) and examine several available technologies. Furthermore, we propose a design of secure transparent mobile IP to provide broadband ITS services over wireless LAN that improves upon security, transparency and handoff of mobile IP. The proposed design adopts a tunnel-in-tunnel mechanism for...

Journal: :International Journal of Electronics and Electical Engineering 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید