A network coding and DES based dynamic encryption scheme for moving target defense

H Tang, QT Sun, X Yang, K Long - IEEE Access, 2018 - ieeexplore.ieee.org
Unlike prior efforts in cybersecurity research, a dynamic defense theory, called moving target
defense, increases the complexity and costs for attacks by effectively restricting the …

[图书][B] Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings

SM Bellovin, R Gennaro, AD Keromytis, M Yung - 2008 - books.google.com
ACNS 2008, the 6th International Conference on Applied Cryptography and Network
Security, was held in New York, New York, June 3–6, 2008, at Columbia University. ACNS …

Study on network security based on PCA and BP neural network under green communication

F Liu, W Huo, Y Han, S Yang, X Li - IEEE Access, 2020 - ieeexplore.ieee.org
In response to the energy consumption caused by the exponential growth of mobile network
capacity demand, the Chen Shanzhi team proposed a user-centric ultra-dense network. It …

[图书][B] Cryptology and Network Security: 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31–November 2, 2023, Proceedings

J Deng, V Kolesnikov, AA Schwarzmann - 2023 - books.google.com
The International Conference on Cryptology and Network Security (CANS) is a premier
forum for presenting research in the field of cryptology and network security. The conference …

A DES ASIC suitable for network encryption at 10 Gbps and beyond

DC Wilcox, LG Pierson, PJ Robertson… - … and Embedded Systems …, 1999 - Springer
Abstract The Sandia National Laboratories (SNL) Data Encryption Standard (DES)
Application Specific Integrated Circuit (ASIC) is the fastest known implementation of the DES …

[PDF][PDF] High-efficiency encryption and authentication network security for automotive Ethernet

JM Li, YJW Shuo-Fu, YN Xu - International Journal of Modeling and …, 2022 - ijmo.org
Automotive ethernet has the advantages of high bandwidth, low latency, and strong
compatibility, which meets the needs of new energy vehicles for the development of network …

A multi-connection encryption algorithm applied in secure channel service system

F Meng, R Lin, Z Wang, H Zou, S Zhou - EAI Endorsed Transactions on …, 2018 - eudl.eu
Encryption is the most important method to enhance security of network transmitting. SDN
(Software Defined Networking) Security Transmission Service can provide multi-connection …

A review paper for the role of cryptography in network security

J Alshehri, A Alhamed - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
Protecting the security and privacy of data has become extremely important in this period,
especially with the increase in new technologies and the adoption of government and …

A new framework for secure network management

FG Hatefi, F Golshani - Proceedings of Sixth International …, 1997 - ieeexplore.ieee.org
We introduce a new protocol, SNMS (secure network management system) with four primary
goals. First, it uses encryption to establish a secure channel between a network manager …

ICEPOLE: high-speed, hardware-oriented authenticated encryption

P Morawiecki, K Gaj, E Homsirikamol… - … and Embedded Systems …, 2014 - Springer
This paper introduces our dedicated authenticated encryption scheme ICEPOLE. ICEPOLE
is a high-speed hardware-oriented scheme, suitable for high-throughput network nodes or …