نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

Journal: :Security and Communication Networks 2016
Madhusanka Liyanage Pardeep Kumar Mika Ylianttila Andrei V. Gurtov

In this paper, we propose two secure virtual private network architectures for the long-term evolution backhaul network. They are layer 3 Internet protocol (IP) security virtual private network architectures based on Internet key exchange version 2 mobility and multihoming protocol and host identity protocol. Both architectures satisfy a complete set of 3GPP backhaul security requirements such ...

2010
Kazuyuki NISHIDA Shingo ATA Hiroshi KITAMURA Masayuki MURATA

Current IP communication style is not optimized and has various problems. Sufficient security considerations (including privacy protection) are not provided. Despite the “well-known port” method being known to be inappropriate from security standpoint, it continues to be used it. The conventional belief that one node owns one IP address and communication sessions are basically multiplexed at th...

2005
Olga Gelbart Paul Ott Bhagirath Narahari Rahul Simha Alok N. Choudhary Joseph Zambreno

The science of security informatics has become a rapidly growing field involving different branches of computer science and information technologies. Software protection, particularly for security applications, has become an important area in computer security. This paper proposes a joint compiler/hardware infrastructure CODESSEAL for software protection for fully encrypted execution in which b...

Journal: :Journal of Systems and Software 2011
Saraju P. Mohanty Elias Kougianos

Existing secureembeddedsystemsareprimarily cryptographybased.However, for effectiveDigital Rights Management (DRM)ofmultimedia in the frameworkof embedded systems, bothwatermarking and cryptography are necessary. In this paper, a watermarking algorithm and corresponding VLSI architectures are presented thatwill insert a broadcaster’s logo into video streams in real-time to facilitate copyrighte...

2010
Ritu Malik Rupali Syal

Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. . IPSec architecture requires the host to provide confidentiality using Encapsulating Security Payload and data integrity using either Authentication Header or Encapsulating Security Payload and anti-replay protection. IPSec ...

2014
Alan Johnston

With the recent revelations about pervasive surveillance on the Internet, there is renewed interest in techniques that protect against passive eavesdropping without relying on a Public Key Infrastructure (PKI). An ephemeral Diffie-Hellman (DH) key agreement can provide such protection, but (without authentication) the exchange is vulnerable to a Man in the Middle (MitM) attack. An example of a ...

2008
Sebastian Kiesel

The history of the Internet has been an impressive success story. The underlying IP protocol suite originally has been designed for non-realtime computer communications. However, practical experience has shown that these protocols are also suitable for the realtime transmission of multimedia sessions in many scenarios. Today, “Voice over IP” (VoIP) is widely used to replace conventional private...

Journal: :IEEE Access 2016
Anirban Sengupta Saraju P. Mohanty Fabrizio Lombardi Mark Zwolinski

It is a well-known fact that design productivity is failing to keep pace with the big increase in the demands of applications and advanced silicon technology, especially in the domain of portable electronics. Moreover owing to the massive complexity of modern systems-on-chip (SoC), complete in-house development is impossible, and thus globalization of the design process has established itself a...

2010
Michael Glass

results in complex and cost-intensive E/E architectures. For this reason the innovation alliance for automobile electronics E|ENOVA initiated the research project “SEIS – Safety in Embedded IP-based Systems”, with the aim of creating a consistent security solution for internet protocol based communication inside the vehicle and for the vehicle’s communication with the environment. The project p...

2008
Neng-Chung Wang Jong-Shin Chen Yung-Fa Huang Tzu-Wei Chan

The Mobile IP network environment for users is very vulnerable to malicious attacks, such as denial-of-service, man-in-the-middle, and other types of attacks. For protection, the IETF standard Mobile IP protocol is modified with IP security (IPSec) primitives, which control the packet flow from a mobile host through multiple security gateways. In addition, IPSec uses strong cryptographic authen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید