نتایج جستجو برای: hardware security ip protection security path
تعداد نتایج: 611393 فیلتر نتایج به سال:
In this paper, we propose two secure virtual private network architectures for the long-term evolution backhaul network. They are layer 3 Internet protocol (IP) security virtual private network architectures based on Internet key exchange version 2 mobility and multihoming protocol and host identity protocol. Both architectures satisfy a complete set of 3GPP backhaul security requirements such ...
Current IP communication style is not optimized and has various problems. Sufficient security considerations (including privacy protection) are not provided. Despite the “well-known port” method being known to be inappropriate from security standpoint, it continues to be used it. The conventional belief that one node owns one IP address and communication sessions are basically multiplexed at th...
The science of security informatics has become a rapidly growing field involving different branches of computer science and information technologies. Software protection, particularly for security applications, has become an important area in computer security. This paper proposes a joint compiler/hardware infrastructure CODESSEAL for software protection for fully encrypted execution in which b...
Existing secureembeddedsystemsareprimarily cryptographybased.However, for effectiveDigital Rights Management (DRM)ofmultimedia in the frameworkof embedded systems, bothwatermarking and cryptography are necessary. In this paper, a watermarking algorithm and corresponding VLSI architectures are presented thatwill insert a broadcaster’s logo into video streams in real-time to facilitate copyrighte...
Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. . IPSec architecture requires the host to provide confidentiality using Encapsulating Security Payload and data integrity using either Authentication Header or Encapsulating Security Payload and anti-replay protection. IPSec ...
With the recent revelations about pervasive surveillance on the Internet, there is renewed interest in techniques that protect against passive eavesdropping without relying on a Public Key Infrastructure (PKI). An ephemeral Diffie-Hellman (DH) key agreement can provide such protection, but (without authentication) the exchange is vulnerable to a Man in the Middle (MitM) attack. An example of a ...
The history of the Internet has been an impressive success story. The underlying IP protocol suite originally has been designed for non-realtime computer communications. However, practical experience has shown that these protocols are also suitable for the realtime transmission of multimedia sessions in many scenarios. Today, “Voice over IP” (VoIP) is widely used to replace conventional private...
It is a well-known fact that design productivity is failing to keep pace with the big increase in the demands of applications and advanced silicon technology, especially in the domain of portable electronics. Moreover owing to the massive complexity of modern systems-on-chip (SoC), complete in-house development is impossible, and thus globalization of the design process has established itself a...
results in complex and cost-intensive E/E architectures. For this reason the innovation alliance for automobile electronics E|ENOVA initiated the research project “SEIS – Safety in Embedded IP-based Systems”, with the aim of creating a consistent security solution for internet protocol based communication inside the vehicle and for the vehicle’s communication with the environment. The project p...
The Mobile IP network environment for users is very vulnerable to malicious attacks, such as denial-of-service, man-in-the-middle, and other types of attacks. For protection, the IETF standard Mobile IP protocol is modified with IP security (IPSec) primitives, which control the packet flow from a mobile host through multiple security gateways. In addition, IPSec uses strong cryptographic authen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید