A new integer FPE scheme based on Feistel network

C Jia, Z Liu, J Li, Z Dong, X You - Advances in Electric and Electronics, 2012 - Springer
Format-preserving encryption implies a block cipher which encrypts a plaintext of some
specified format into a ciphertext of identical format. In the paper, we make an overview of …

Protecting privacy with protocol stack virtualization

J Lindqvist, JM Tapio - Proceedings of the 7th ACM workshop on Privacy …, 2008 - dl.acm.org
Previously proposed host-based privacy protection mechanisms use pseudorandom or
disposable identifiers on some or all layers of the protocol stack. These approaches either …

Enterprise network packet filtering for mobile cryptographic identities

J Lindqvist, E Vehmersalo, M Komu… - Emergent Trends in …, 2012 - igi-global.com
Firewalls are an essential component of the Internet and enterprise network security policy
enforcement today. The configurations of enterprise firewalls are typically rather static. Even …

[引用][C] Synplicity introduces secure IP flow for FPGAs, signs ARM, Tensilica as partners

M Miller - EDN online, http://www. edn. com/index. asp

Encrypted file system using TCPA

DC Challener, DR Safford - US Patent 7,343,493, 2008 - Google Patents
The present invention relates generally to electronic data storage systems and in particular
to security of electronic file systems on a data storage medium. Still more particularly, the …

[图书][B] Cisco secure Internet security solutions

AG Mason, MJ Newcomb - 2001 - books.google.com
Annotation nbsp; Essential security strategies using Cisco's complete solution to network
security! The only book to cover interoperability among the Cisco Secure product family to …

Secure and Efficient Bandwidth Management for Local and Personal Area Networks Using Customized Open Source Application on a Commodity Hardware …

S Sharma, M Manuja, D Puri, A Kumar - Innovations in Information and …, 2021 - Springer
The bandwidth allocation and management which converges on efficient network
performance is one of the important issues today in most of the organizations. The …

[图书][B] Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings

J Zhou, M Yung, Y Han - 2003 - books.google.com
The 1st International Conference on “Applied Cryptography and Network Se-rity”(ACNS
2003) was sponsored and organized by ICISA (International C-munications and Information …

RFC 9333: Minimal IP Encapsulating Security Payload (ESP)

D Migault, T Guggemos - 2023 - dl.acm.org
This document describes the minimal properties that an IP Encapsulating Security Payload
(ESP) implementation needs to meet to remain interoperable with the standard ESP as …

[图书][B] Preventing encrypted traffic analysis

NA Schear - 2011 - search.proquest.com
Many existing encrypted Internet protocols leak information through packet sizes and timing.
Though seemingly innocuous, prior work has shown that such leakage can be used to …