Results 61 to 70 of about 462,961 (193)
This paper presents a security aware design methodology to design secure generalized likelihood ratio test (GLRT) hardware intellectual property (IP) core for electrocardiogram (ECG) detector against IP piracy and fraudulent claim of IP ownership threats.
Anirban Sengupta, Aditya Anshul
doaj +1 more source
A Security Analysis on OpenSIPS
IP Telephony, Internet Telephony, Digital Phone or often also called VoIP (Voice Over Internet Protocol) is a technology that allows long-distance voice conversations with the Internet.
Gandeva Bayu Satrya +1 more
doaj +1 more source
An analysis of security issues in building automation systems [PDF]
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core +2 more sources
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire
The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking events. Major outages such as the China Telecom incident in 2010 stimulate speculations about malicious intentions behind such anomalies.
Carle, Georg +4 more
core +2 more sources
Securing mobile IP enabled laptop
Abstract Mobile IP Onternet Protocol) enables access to the Internet anywhere with one IP address, hence, providingthe flexibility that is required by today’s growing mobile work force. Deploying Mobile IP introduces newsecurity h a t s that if not carefully addressed can have severe consequences for home organizations.
R. Wiangsripanawan +2 more
openaire +2 more sources
The rise of digital content has made the need for reliable and practical intellectual property (IP) management systems more critical than ever. Most traditional IP systems are prone to issues such as delays, inefficiency, and data security breaches. This
Abeer S. Al-Humaimeedy
doaj +1 more source
A Survey on Future Internet Security Architectures
Current host-centric Internet Protocol (IP) networks are facing unprecedented challenges, such as network attacks and the exhaustion of IP addresses. Motivated by emerging demands for security, mobility, and distributed networking, many research projects
Wenxiu Ding, Zheng Yan, Robert H. Deng
doaj +1 more source
Securing reusable hardware intellectual property (IP) cores used in system-on-chip (SoC) designs is crucial, due to global design supply chain that may introduce different points of security vulnerability.
Anirban Sengupta +3 more
doaj +1 more source
A Thorough Review of Security in Information-Centric Networking
The rapid evolution of technology has revealed the limitations of host-centric or IP address–based networks. To overcome these limitations, a new communication paradigm has emerged: the information-centric networking (ICN), which focuses on content (data)
Ado Adamou Abba Ari +6 more
doaj +1 more source
EPCglobal network is used to share product data between trading partners, which was proposed by EPCglobal. Object Name Service (ONS) in EPCglobal framework raises two critical security risks: the authenticity of IP addresses for Physical Markup Language (
Wei Ren, Liangli Ma, Yi Ren
doaj +1 more source

