نتایج جستجو برای: hardware security ip protection security path
تعداد نتایج: 611393 فیلتر نتایج به سال:
In order to protect the security of network data, a high speed chip module for encrypting and decrypting of network data packet is designed. The chip module is oriented for internet information security SOC (System on Chip) design. During the design process, AES (Advanced Encryption Standard) and 3DES (Data Encryption Standard) encryption algorithm are adopted to protect the security of network...
IP Security (IPsec) provides various security services for IP traffic. However, the benefits of IPsec come at the cost of increased overhead. This document outlines a framework for integrating Robust Header Compression (ROHC) over IPsec (ROHCoIPsec). By compressing the inner headers of IP packets, ROHCoIPsec proposes to reduce the amount of overhead associated with the transmission of traffic o...
In this paper we specify a set of security services and architecture of agent which is based upon mobile system. The security services are mainly divide into three main classes which is named as security services for protection of execution platform, protecting agent using security services ,communication for security services. We also describe functionality of security and where functionality ...
The new-found ubiquity of embedded processors in consumer and industrial applications brings with it an intensified focus on security, as a strong level of trust in the system software is crucial to their widespread deployment. The growing area of software protection attempts to address the key steps used by hackers in attacking a software system. In this paper we introduce a unique approach to...
A platform independent security architecture for use in Multi-Processor System-on-Chip integrated circuits, primarily oriented for mobile phones and handheld devices, is presented. The suggested architecture provides an enhanced security protection scheme for use in smartphones, PDA’s, as well as other similar systems. Sensitive data storage facilities, cryptographic engines, and physical prote...
In today’s highly globalised and competitive world access to information plays key role in having an upper hand between business rivals. Hence, proper protection of such crucial resource is core to any modern business. Implementing a successful information security system is basically centered around three pillars; technical solution involving both software and hardware, information security co...
IP Multicast has proven to be very good for many-tomany multimedia communications like audio and videoconferencing. However, there are only few Internet Service Providers (ISPs) offering it as a true Internet service. Nowadays, IP Multicast has various issues that are not solved yet and that are making ISPs to think twice before offering IP Multicast to their customers. Some of these issues are...
The TCP/IP suite, the basis for today’s Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-in security becomes more and more problematic. This paper describes serious attacks against IP control and management protocols with an accent on the ICMP protocol, as well as some of the well-known vulnerabilities of the inter-domai...
In 1999, the ATM Forum international consortium approved the first version of its ATM security specifications, whereas the Internet Engineering Task Force (IETF) published a series of IP security RFC. The aim of those documents is to protect communications over Asynchronous Transfer Mode (ATM) network, respectively the Internet Protocol (IP) network by offering data confidentiality, partners au...
various and complex human activities in geographical contexts need proper ground if at most efficiency is to be achieved. land preparation regulates the relationship between human, space, and human activities. land preparation has various dimensions related to value system, political, scientific, artistic, and defense-security aspects. one of the most important dimensions of land preparation is...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید