نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

2013
Abdullah H. Alqahtani Mohsin Iftikhar

The TCP/IP protocol suite is the foundation of Internet and is ubiquitous in almost all networks worldwide. It was written as a robust protocol, which is able to communicate despite node failures. The design parameters of TCP did not weigh security as important and placed an implicit trust on nodes. The result was a protocol which was reliable and robust, but contained myriad inherent security ...

2015
Hani Alquhayz

—In recent years, there have been major developments in, and deployment of, diverse mobile technology. Security issues in mobile computing are now presenting significant challenges. The ability to move from one network to another, and from one provider to another creating thus vertical and horizontal handoffs, has increased the complexity of mobile security. There are many research groups, such...

2001
Ralf Ackermann Markus Schumacher Utz Roedig Ralf Steinmetz

Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part of our future communication infrastructure (e.g. as classical PBX enhancement or replacement) continuous high availability, stable and error-free operation and the protection of the privacy of the spoken word are challenges, th...

Journal: :International Journal of Power Electronics and Drive Systems 2023

Globalization of the chip design and manufacturing industry has imposed significant threats to hardware security integrated circuits (ICs). It made ICs more susceptible various attacks. Blockchain provides a trustworthy distributed platform store immutable records related evidence intellectual property (IP) creation, authentication provenance, confidential data storage. However, blockchain enco...

Journal: :RFC 1998
Rodney Thayer Naganand Doraswamy Rob Glenn

The IPsec protocol suite is used to provide privacy and authentication services at the IP layer. Several documents are used to describe this protocol suite. The interrelationship and organization of the various documents covering the IPsec protocol are discussed here. An explanation of what to find in which document, and what to include in new Encryption Algorithm and Authentication Algorithm d...

Journal: :IEEE Journal on Selected Areas in Communications 1999
Jun Xu Mukesh Singhal

We present the design of a value-added ATM switch that is capable of performing packet-level (IP) filtering at the maximum throughput of 2.88 Gbit/s per port. This firewall switch nicely integrates the IP level security mechanisms into the hardware components of an ATM switch so that most of the filtering operations are performed in parallel with the normal cell processing, and most of its cost...

ژورنال: طب جانباز 2019
Bagherian Kakhki , M., Namani , E.,

Aims: After the end of the war and the return of the warriors to the family, due to the stresses of the war and its devastating effect on the spirit and soul of the veterans, the adverse effects of war on the family, especially the spous, continue.The aim of this study was to investigate the mediating role of psychological security in the relationship between optimism and self-compassion with p...

Journal: :IBM Systems Journal 1998
Pau-Chen Cheng Juan A. Garay Amir Herzberg Hugo Krawczyk

In this paper we present the design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer. The design includes three components: (1) a security policy for determining when, where, and how security measures are to be applied; (2) a modular key management protocol, called MKMP, for establishing sh...

Journal: :Wireless Networks 2001
Jim Binkley William Trost

We have built an experimental link-level authenticated ad hoc routing protocol and integrated it with the PSU version of Mobile-IP. The routing protocol is intended to address survivability and link security issues. In our modiied version of Mobile-IP, we authenticate ICMP router discovery packets, which are sent by both Mobile-IP agents and mobile nodes. The router discovery packets allow syst...

Journal: :Microprocessors and Microsystems 2007
Javier Castillo Pablo Huerta José Ignacio Martínez

Nowadays there is a growing number of systems based on FPGAs spread over wide areas. When these kind of systems are used, serious security problems may appear. The configuration data for these devices can be very sensitive information that has to be protected against piracy and reverse engineering. In this paper, the main target is to describe a rapid prototyping platform that allows Secure IP ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید