Evolving defense mechanism for future network security

H Zhou, C Wu, M Jiang, B Zhou, W Gao… - IEEE …, 2015 - ieeexplore.ieee.org
The past few years have witnessed revolutionary advances in network technology. Along
with new techniques such as SDN come lots of new network security challenges …

Bitstream encryption and authentication using AES-GCM in dynamically reconfigurable systems

Y Hori, A Satoh, H Sakane, K Toda - Advances in Information and …, 2008 - Springer
A secure and dependable dynamic partial reconfiguration (DPR) system based on the AES-
GCM cipher is developed, where the reconfigurable IP cores are protected by encrypting …

Optimization of data packet encryption algorithm in network link transport layer

Z Zhang - Journal of Cyber Security Technology, 2024 - Taylor & Francis
With the rapid development of information technology, huge data information is exchanged
every moment in various types of networks, which contain information such as commercial …

Research on the application of data encryption technology in communication security

X Li, G Wang, W Pan - International Journal of Autonomous …, 2021 - inderscienceonline.com
Aiming at the security problems of data monitoring, and forgery and tampering in the process
of wireless communication network, this paper proposes a lightweight data encryption …

A reconfigurable block cryptographic processor based on VLIW architecture

L Wei, Z Xiaoyang, N Longmei, C Tao… - China …, 2016 - ieeexplore.ieee.org
An Efficient and flexible implementation of block ciphers is critical to achieve information
security processing. Existing implementation methods such as GPP, FPGA and …

[PDF][PDF] A new way to design and implementation of hybrid crypto system for security of the information in public network

RK Gupta, P Singh - International Journal of Emerging Technology and …, 2013 - Citeseer
In this paper, a new hybrid concept is proposed by analyzing the principle of the hybrid
cryptography based on the combination of symmetric and message digesting. Moreover, the …

[PDF][PDF] The encryption algorithm AES-RFWKIDEA32-1 based on network RFWKIDEA32-1

A Mersaid, T Gulom - International Journal of Electronics and …, 2016 - ijeie.jalaxy.com.tw
In this article, we developed a new block encryption algorithm based on network
RFWKIDEA32-1 using of the transformations of the encryption algorithm AES, which is …

Parameterized improved fast encryption algorithm for multimedia PIFEA-M

AG Chefranov - IEEE communications letters, 2008 - ieeexplore.ieee.org
Improved fast encryption algorithm for multimedia IFEA-M is modified to withstand recently
discovered vulnerability to differential known plaintext-ciphertext attack. The proposed …

Smart encryption channels for securing virtual machine‐based networked applications

W Itani, A Kayssi, A Chehab - Security and Communication …, 2009 - Wiley Online Library
We present PARAGON, a novel security protocol for efficiently securing the network
communications of web‐deployed enterprise applications. PARAGON relies on an …

A new approach to building a disguised server using the honey port against general scanning attacks

HS Park, YB Jeon, JW Yoon - International Conference on Broadband and …, 2016 - Springer
The port scan is a well-known technique which malicious people often use before attacking
a server. The attackers obtain the fingerprint of the target server by scanning ports and then …