نتایج جستجو برای: hardware security ip protection security path
تعداد نتایج: 611393 فیلتر نتایج به سال:
The security of Critical Infrastructures has become a prominent problem with the advent of modern ICT technologies used to improve the performance and the features of Process Control Systems. Several scientific works have showed how Supervisory Control And Data Acquisition Systems (SCADA), i.e. the systems that control industrial installations, are exposed to cyber-attacks. Traditional ICT secu...
attracting foreign investment is a technique to achieve economic development, which requires establishment of appropriate legal and administrative infrastructure. in addition, host countries may ignore their public interest and national security. therefore, they have to maintain a balance between economic development and protection of national security. the concern over the national security as...
As the commercial use of the Internet becomes common and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system: "Network CryptoGate (NCG)", which employs the IETF/Mobile IP and the IETF/IP security on stationary security gateways (NCG servers) and mobile hosts (NC...
Hardware obfuscation is a technique to conceal the design frommalicious insider and outsider adversaries. Obfuscation techniques transform the original design such that the obfuscated version is functionally equivalent to the original design, but it does not reveal the design details and is much harder to reverse-engineer [1]. As discussed earlier in Chap.1, the business model of distributed an...
Cloud computing is a natural extension of virtualisation technologies that enable scalable management of virtual machines over a massive physically connected systems. The virtualisation-based cloud computing paradigm offers a practical approach to green IT/clouds, which emphasise the construction and deployment of scalable, energy-efficient network software applications (NetApp) by virtue of im...
The outsourcing of integrated circuit (IC) fabrication services to overseas manufacturing foundry has raised security and privacy concerns with regard to intellectual property (IP) protection as well as the integrity maintenance of the fabricated chips. One way to protect ICs from malicious attacks is to encrypt and obfuscate the IP design by incorporating additional key gates, namely logic enc...
DoS/DDoS attacks constitute one of the major classes of security threats in the Internet today. The attackers usually use IP spoofing to conceal their real location. The current Internet protocols and infrastructure do not provide intrinsic support to traceback the real attack sources. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the a...
A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thingto-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and li...
In this paper we discuss the issues of wireless mobile networks for intelligent transportation systems (ITS) and examine several available technologies. Furthermore, we propose a design of secure transparent mobile IP to provide broadband ITS services over wireless LAN that improves upon security, transparency and handoff of mobile IP. The proposed design adopts a tunnel-in-tunnel mechanism for...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید