نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

Journal: :CoRR 2012
Yixin Liu Haipeng Zhang Tao Feng

In order to protect the security of network data, a high speed chip module for encrypting and decrypting of network data packet is designed. The chip module is oriented for internet information security SOC (System on Chip) design. During the design process, AES (Advanced Encryption Standard) and 3DES (Data Encryption Standard) encryption algorithm are adopted to protect the security of network...

Journal: :RFC 2010
Emre Ertekin Rohan Jasani Chris Christou Carsten Bormann

IP Security (IPsec) provides various security services for IP traffic. However, the benefits of IPsec come at the cost of increased overhead. This document outlines a framework for integrating Robust Header Compression (ROHC) over IPsec (ROHCoIPsec). By compressing the inner headers of IP packets, ROHCoIPsec proposes to reduce the amount of overhead associated with the transmission of traffic o...

2015
Deepika Sharma

In this paper we specify a set of security services and architecture of agent which is based upon mobile system. The security services are mainly divide into three main classes which is named as security services for protection of execution platform, protecting agent using security services ,communication for security services. We also describe functionality of security and where functionality ...

2004
JOSEPH ZAMBRENO BHAGI NARAHARI NASIR MEMON Joseph Zambreno

The new-found ubiquity of embedded processors in consumer and industrial applications brings with it an intensified focus on security, as a strong level of trust in the system software is crucial to their widespread deployment. The growing area of software protection attempts to address the key steps used by hackers in attacking a software system. In this paper we introduce a unique approach to...

Journal: :Computers & Electrical Engineering 2007
Asaf Ashkenazi Dmitry Akselrod

A platform independent security architecture for use in Multi-Processor System-on-Chip integrated circuits, primarily oriented for mobile phones and handheld devices, is presented. The suggested architecture provides an enhanced security protection scheme for use in smartphones, PDA’s, as well as other similar systems. Sensitive data storage facilities, cryptographic engines, and physical prote...

2012
Nerey H. Mvungi

In today’s highly globalised and competitive world access to information plays key role in having an upper hand between business rivals. Hence, proper protection of such crucial resource is core to any modern business. Implementing a successful information security system is basically centered around three pillars; technical solution involving both software and hardware, information security co...

2000
Antonio F. Gómez-Skarmeta Angel L. Mateo-Martinez Pedro M. Ruiz

IP Multicast has proven to be very good for many-tomany multimedia communications like audio and videoconferencing. However, there are only few Internet Service Providers (ISPs) offering it as a true Internet service. Nowadays, IP Multicast has various issues that are not solved yet and that are making ISPs to think twice before offering IP Multicast to their customers. Some of these issues are...

Journal: :Computer Networks 2000
Madalina Baltatu Antonio Lioy Fabio Maino Daniele Mazzocchi

The TCP/IP suite, the basis for today’s Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-in security becomes more and more problematic. This paper describes serious attacks against IP control and management protocols with an accent on the ICMP protocol, as well as some of the well-known vulnerabilities of the inter-domai...

2006
Maryline Laurent-Maknavicius

In 1999, the ATM Forum international consortium approved the first version of its ATM security specifications, whereas the Internet Engineering Task Force (IETF) published a series of IP security RFC. The aim of those documents is to protect communications over Asynchronous Transfer Mode (ATM) network, respectively the Internet Protocol (IP) network by offering data confidentiality, partners au...

Journal: :جغرافیا و توسعه ناحیه ای 0
زرقانی زرقانی اعظمی اعظمی

various and complex human activities in geographical contexts need proper ground if at most efficiency is to be achieved. land preparation regulates the relationship between human, space, and human activities. land preparation has various dimensions related to value system, political, scientific, artistic, and defense-security aspects. one of the most important dimensions of land preparation is...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید