Sciweavers

13 search results - page 1 / 3
» Exploiting Stateful Inspection of Network Security in Reconf...
Sort
View
FPL
2003
Springer
75views Hardware» more  FPL 2003»
14 years 4 months ago
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware
Shaomeng Li, Jim Torresen, Oddvar Sørå...
JCP
2008
119views more  JCP 2008»
13 years 11 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
ANCS
2006
ACM
14 years 2 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo
DSN
2003
IEEE
14 years 4 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
ANCS
2010
ACM
13 years 9 months ago
The case for hardware transactional memory in software packet processing
Software packet processing is becoming more important to enable differentiated and rapidly-evolving network services. With increasing numbers of programmable processor and acceler...
Martin Labrecque, J. Gregory Steffan