Secure keyed hashing on programmable switches

S Yoo, X Chen - Proceedings of the ACM SIGCOMM 2021 Workshop on …, 2021 - dl.acm.org
Cyclic Redundancy Check (CRC) is a computationally inexpensive function readily
available in many high-speed networking devices, and thus it is used extensively as a hash …

[引用][C] A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review

U Tariq, I Ahmed, AK Bashir, K Shaukat - Sensors, 2023 - MDPI

Cryptographic hashing in p4 data planes

D Scholz, A Oeldemann, F Geyer… - 2019 ACM/IEEE …, 2019 - ieeexplore.ieee.org
P4 introduces a standardized, universal way for data plane programming. Secure and
resilient communication typically involves the processing of payload data and specialized …

Next-generation internet at terabit speed: SCION in P4

J de Ruiter, C Schutijser - … of the 17th International Conference on …, 2021 - dl.acm.org
Regularly, new architectures are proposed to address shortcomings in the current internet. It
is not always trivial to evaluate how these proposals would perform in practice. This situation …

Software Defined Networking Architecture for Energy Transaction in Smart Microgrid Systems

R Roux, TO Olwal, DSP Chowdhury - Energies, 2023 - mdpi.com
A decentralized power distribution network consisting of smart microgrids introduces
opportunities to trade with energy called transactive energy. However, research studies in …

Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI and MTD Approaches to Security Solutions

AH Abdi, L Audah, A Salh, MA Alhartomi… - IEEE …, 2024 - ieeexplore.ieee.org
Software-Defined Networking (SDN) is a groundbreaking technology that has transformed
network management significantly. By integrating data and control, SDN offers unparalleled …

[HTML][HTML] Analysis and practical validation of a standard SDN-based framework for IPsec management

G López-Millán, R Marín-López… - Computer Standards & …, 2023 - Elsevier
Abstract The Internet Engineering Task Force (IETF), the international standardization
organism for the Internet, has recently approved a standard, RFC 9061, which defines an …

Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice Over Internet Protocol

S Budiyanto, D Gunawan - Ieee Access, 2023 - ieeexplore.ieee.org
Voice over Internet Protocols (VoIP) is an IP-based communication technology or commonly
known as Internet Protocols (IP). In which, IP is currently widely used for mobile …

A P4-assisted task offloading scheme for Fog networks: An intelligent transportation system scenario

O Akyıldız, İ Kök, FY Okay, S Özdemir - Internet of Things, 2023 - Elsevier
Abstract In Fog-based Internet of Things (IoT) networks, Fog computing offers great promises
to achieve efficient task processing among IoT devices and the Cloud with lower processing …

[PDF][PDF] Programmable in-network obfuscation of DNS traffic

L Wang, H Kim, P Mittal, J Rexford - NDSS: DNS Privacy Workshop, 2021 - dnsprivacy.org
In conventional DNS, or Do53, requests and responses are sent in cleartext. Thus, DNS
recursive resolvers or any onpath adversaries can access privacy-sensitive information. To …
为了回应用户根据美国数字千年版权法案 (DMCA) 向我们提交的投诉,我们已从此页上移除了 1 个结果。如果需要,您可以访问 LumenDatabase.org,查看导致结果遭到移除的 DMCA 投诉内容