نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

2010
Nikos Vrakas Dimitris Geneiatakis Costas Lambrinoudakis

The IP Multimedia Subsystem (IMS) infrastructure is currently considered to be the main core of Next Generation Networks (NGNs), integrating IP and other network types under one common infrastructure. Consequently, IMS inherits security flaws and vulnerabilities residing in all those technologies. Besides, the protection against unauthorized access in NGN services is of great importance. In thi...

2013
Riaz A Khan

The increasing demand of mobile gadgets like mobile phones, mini PCs, laptops and tablets etc. has made the Mobile IP (MIP) one of the current research issues of IETF. Mobile IP as the name suggests; protocol which supports mobility of IP-addresses or we can say the mobility of different IP-nodes. Mobile IP has become an important technical tool in the establishment of enveloping computing envi...

2002
Alain Azagury Ran Canetti Michael Factor Shai Halevi Ealan A. Henis Dalit Naor Noam Rinetzky Ohad Rodeh Julian Satran

Storage Area Networks (SAN) are based on direct interaction between clients and storage servers exposing the storage server to network attacks. Giving the client direct access to the storage servers requires verification that the client requests conform with the system protection policy. Today, the only available solutions enforce access control at the granularity of entire storage servers. Thi...

2010
M. Anand Kumar

With the rapid growth and usage of Internet, network security becomes a major issue in the field of research. TCP and IP are the two protocols, which is basis for today’s Internet. IPv4 is the Internet protocol that is replaced with IPv6, which comes with the build mechanism called IPsec for security. But it lacks security in the application layer of TCP/IP Protocol suite. So there is a need fo...

2007
Yousra Alkabani Farinaz Koushanfar

We introduce the first active hardware metering scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy and runtime tampering. The novel metering method simultaneously employs inherent unclonable variability in modern manufacturing technology, and functionality preserving alternations of the structural IC specifications. Active metering works by enabling t...

2000
Herbert Leitold

Telecommunication increasingly influences the way we live, work, and socialize. Buzzword such as the Internet or broadband networking are omnipresent—so are reports of security breaches. Consequently, security services are indispensable to applications as divers as electronic commerce, linking company networks, telemedicine, and so forth. Whereas application built-in security is widely spread, ...

2006
Alexander Becher Zinaida Benenson Maximillian Dornseif

Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort...

2006
Alexander Becher Zinaida Benenson Maximillian Dornseif

Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort...

2004
Eric Byres Justin Lowe

Process control and SCADA systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. Unfortunately, new research indicates this complacency is misplaced – the move to open standards such as Ethernet, TCP/IP and web technologies is letting hackers take advantage of th...

2010
E. Ertekin R. Jasani C. Christou

IP Security (IPsec) provides various security services for IP traffic. However, the benefits of IPsec come at the cost of increased overhead. This document outlines a framework for integrating Robust Header Compression (ROHC) over IPsec (ROHCoIPsec). By compressing the inner headers of IP packets, ROHCoIPsec proposes to reduce the amount of overhead associated with the transmission of traffic o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید