نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

2009

Network Management Systems have played a great important role in information systems. Management is very important and essential in any fields. There are many managements such as configuration management, fault management, performance management, security management, accounting management and etc. Among them, configuration, fault and security management is more important than others. Because th...

Journal: :RFC 2013
Luyuan Fang Ben Niven-Jenkins Scott Mansfield Richard Graveman

This document provides a security framework for the MPLS Transport Profile (MPLS-TP). MPLS-TP extends MPLS technologies and introduces new Operations, Administration, and Maintenance (OAM) capabilities, a transport-oriented path protection mechanism, and strong emphasis on static provisioning supported by network management systems. This document addresses the security aspects relevant in the c...

2010
Fang Hao T. V. Lakshman Sarit Mukherjee Haoyu Song

Despite the rapid development in the field of cloud computing, security is still one of the major hurdles to cloud computing adoption. Most cloud services (e.g. Amazon EC2) are offered at low cost without much protection to users. At the other end of the spectrum, highly secured cloud services (e.g. Google “government cloud”) are offered at much higher cost by using isolated hardware, facility,...

2012
Michael Lackner Reinhard Berlach Johannes Loinig Reinhold Weiss Christian Steger

Currently, security checks on Java Card applets are performed by a static verification process before executing an applet. A verified and later unmodified applet is not able to break the Java Card sand-box model. Unfortunately, this static verification process is not a countermeasure against physical run-time attacks corrupting the control or data flow of an applet. In this piece of work, desig...

2012
Amit Chaturvedi Damodar Tiwari

In this paper we present the protection of long lived private key & public key using cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private key and public key will soon its security absolutely disintegrates. Public key are used in two different based, i.e. RSA and elliptic curve cryptography both are modular based arithm...

2011
Sadeta Krijestorac Marc Beck Jonathan Bagby

A Border Gateway Protocol is a path vector routing protocol that coordinates the routing of packets through multiple administrative domains by computing routes between every IP address the packet passes. Certain routers, called BGP speakers, are assigned to run the protocol. BGP speakers across different Autonomous Systems (AS) are interconnected in order to exchange routing information. BGP su...

Journal: :CoRR 2014
Oleg Finko Sergey Dichenko

We present a new approach to constructing of pseudo-random binary sequences (PRS) generators for the purpose of cryptographic data protection, secured from the perpetrator’s attacks, caused by generation of masses of hardware errors and faults. The new method is based on use of linear polynomial arithmetic for the realization of systems of boolean characteristic functions of PRS’ generators. “A...

2015
Yier Jin Dhananjay S. Phatak

Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently j...

2010
Kai Zhang Xiaoming Ding Ke Xiong Baolong Yu Shuo Dai

This paper designs a novel security system on NetFPGA platform and Virtex5-LX110T using embedded soft-core technology. The system consists of two subsystems. The first one is a mainly used to protection subnets, which is implemented on NetFPGA board and the second one is a network intrusion detection system (NIDS) which is implemented on Xilinx Virtex5-LX110T board. Moreover, the two subsystems...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید