Many applications envisioned for ultra-high-speed networks require cryptographic transformations for data in transit. Security has often been an afterthought, and cryptographic support has generally not kept pace with performance increases in other network components. Two distinct experimental prototypes of high-speed DES boards were built to understand architectural issues in providing cryptographic support for the AURORA gigabit testbed. Combining cryptographic support with the host/network interface is indicated
We present an interesting application of network processors in the field of network security. Specif...
Demand for effective network defense capabilities continues to increase as cyber attacks occur more ...
The High-Performance Computing Initiative from the White House Office of Science and Technology Poli...
Many applications envisioned for ultra-high-speed networks require cryptographic transformations for...
This chapter summarizes what we have learned in the past decade of research into extremely high thro...
The growth of the Internet has enabled it to become a critical component used by businesses, governm...
Broadband networks based on the asynchronous transfer mode (ATM) are emerging rapidly. Both the tech...
BISDN services will involve the integration of high speed data, voice, and video functionality deliv...
AURORA is one of five U.S. networking testbeds charged with exploring applications of, and technolog...
This paper presents Field Programmable Gate Array (FPGA) powered packet-oriented solution for secure...
A major goal of the host interface architecture which has been developed at UPenn is to be sufficien...
Networked information systems have seen explosive growth in the last few years, and are transforming...
The fast extension of inexpensive computer networks has increased the problem of unauthorized access...
The development of next generation protocols, such as UDT (UDP-based data transfer), promptly addres...
Customers of Asynchronous Transfer Mode (ATM) services may need a variety of data authenticity and p...
We present an interesting application of network processors in the field of network security. Specif...
Demand for effective network defense capabilities continues to increase as cyber attacks occur more ...
The High-Performance Computing Initiative from the White House Office of Science and Technology Poli...
Many applications envisioned for ultra-high-speed networks require cryptographic transformations for...
This chapter summarizes what we have learned in the past decade of research into extremely high thro...
The growth of the Internet has enabled it to become a critical component used by businesses, governm...
Broadband networks based on the asynchronous transfer mode (ATM) are emerging rapidly. Both the tech...
BISDN services will involve the integration of high speed data, voice, and video functionality deliv...
AURORA is one of five U.S. networking testbeds charged with exploring applications of, and technolog...
This paper presents Field Programmable Gate Array (FPGA) powered packet-oriented solution for secure...
A major goal of the host interface architecture which has been developed at UPenn is to be sufficien...
Networked information systems have seen explosive growth in the last few years, and are transforming...
The fast extension of inexpensive computer networks has increased the problem of unauthorized access...
The development of next generation protocols, such as UDT (UDP-based data transfer), promptly addres...
Customers of Asynchronous Transfer Mode (ATM) services may need a variety of data authenticity and p...
We present an interesting application of network processors in the field of network security. Specif...
Demand for effective network defense capabilities continues to increase as cyber attacks occur more ...
The High-Performance Computing Initiative from the White House Office of Science and Technology Poli...