1. Trang chủ
  2. » Luận Văn - Báo Cáo

Nghiên cứu, thiết kế ipsec trên nền tảng fpga

109 20 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 109
Dung lượng 4,02 MB

Nội dung

Ngày đăng: 27/01/2021, 11:23

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
[1] C. M. Kozierok, "IPSec Overview, History and Standards," The TCP/IP Guide, 20 9 2005. [Online]. Available:http://www.tcpipguide.com/free/t_IPSecOverviewHistoryandStandards.htm Sách, tạp chí
Tiêu đề: IPSec Overview, History and Standards
[2] T. T. A. Tuan, "Giao thức IPSEC trong lĩnh vực an toàn thông tin," Viblo, 27 11 2017. [Online]. Available: https://viblo.asia/p/giao-thuc-ipsec-trong-linh-vuc-an-toan-thong-tin-oOVlYdPQZ8W Sách, tạp chí
Tiêu đề: Giao thức IPSEC trong lĩnh vực an toàn thông tin
[3] L. S. Cardoso, "Internet security and critical infrastructures," 2004. [Online]. Available: http://www.eurescom.de/message/messagesep2004/Internetsecurityandcritical infrastructure.asp Sách, tạp chí
Tiêu đề: Internet security and critical infrastructures
[4] V. M. I. a. R. D. Williams, "Taxonomies of attacks and vulnerabilities in computer systems," IEEE Communications Surveys & Tutorials, vol. 10, no. 1, pp. 6-19, 2008 Sách, tạp chí
Tiêu đề: Taxonomies of attacks and vulnerabilities in computer systems
[6] T. Wilson, "Targeted attacks on the rise," DarkReading.com, 18 4 2007. [Online]. Available:http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID=208804471 [7] CERT, “Overview of attack trends,” CERT? Coordination Center, Carnegie MellonUniversity, Tech. Rep., 2002 Sách, tạp chí
Tiêu đề: Targeted attacks on the rise," DarkReading.com, 18 4 2007. [Online]. Available: http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID=208804471 [7] CERT, “Overview of attack trends
[8] L. A. Gordon and I. Computer Security, “2004 csi/fbi computer crime and security survey,” 2004, (San Francisco, Calif.). [Online].Available: http://i.cmpnet.com/gocsi/db%5Farea/pdfs/fbi/FBI2004.pdf Sách, tạp chí
Tiêu đề: 2004 csi/fbi computer crime and security survey
[9] T. Grandison and M. Sloman, “A survey of trust in internet applications,” IEEE Communications Surveys & Tutorials, vol. 3, no. 4, pp. 2–16, 2000 Sách, tạp chí
Tiêu đề: A survey of trust in internet applications
[10] A. Chakrabarti and G. Manimaran, “Internet infrastructure security: a taxonomy,” Network, IEEE, vol. 16, no. 6, pp. 13–21, 2002 Sách, tạp chí
Tiêu đề: Internet infrastructure security: a taxonomy
[11] M. Al-Kuwaiti, N. Kyriakopoulos, and S. Hussein, “A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability,” IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 106–124, 2009 Sách, tạp chí
Tiêu đề: A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability
[13] Y. Chen and H. Chen, “Neuronet: An adaptive infrastructure for network security,” Journal of Information, Intelligence and Knowledge, vol. 1, no. 2, pp. 143–168, 2009 Sách, tạp chí
Tiêu đề: Neuronet: An adaptive infrastructure for network security
[14] S. Kent and K. Seo, “Rfc 4301:security architecture for the internet protocol,” 2005. [Online]. Available: http://www.rfc-editor.org/rfc/rfc4301.txt Sách, tạp chí
Tiêu đề: Rfc 4301:security architecture for the internet protocol
[15] A. Callado, C. K. G. Szab, B. P. Gero, J. Kelner, S. Fernandes, and D. Sadok, “A survey on internet traffic identification,” IEEE Communications Surveys & Tutorials, vol. 11, no.3, 2009 Sách, tạp chí
Tiêu đề: A survey on internet traffic identification
[16] P. Li, M. Salour, and X. Su, “A survey of internet worn detection and containment,” IEEE Communications Surveys & Tutorials, vol. 10, no. 1, pp. 20–35, 2008 Sách, tạp chí
Tiêu đề: A survey of internet worn detection and containment
[19] IPsec performance, OpenWRT project webpage (accessed 17.05.16), https://wiki.openwrt.org/doc/howto/vpn.IPsec.performance Link
[54] Weaver, N., and Wawrzynek, J.: ‘High performance, compact AES implementations in Xilinx FPGAs’, 27 September 2002,http://www.cs.berkeley.edu/nweaver/sfra/rijndael.pdf, accessed June 2005 Link
[58] National Institute of Standards and Technology.: ‘Secure hash standard’. Federal Information Processing Standards Publication (FIPS PUB) 180-2, 1 August 2002, with changes, 25 February 2004, http://www.csrc.nist.gov/publications/fips/fips180-2/ fips180- 2withchangenotice.pdf, accessed June 2005 Link
[80] Zibin, D., and Ning, Z.: ‘FPGA Implementation of SHA-1 algorithm’. Proc. 2003 5th Int. Conf. ASIC, ASICON 2003, Beijing, China, October 2003, Vol. 2, pp. 1321–1324 [81] Altera Corporation: ‘Stratix II device handbook, volume 2’,http://www.altera.com/literature/hb/stx2/stratix2_handbook.pdf, May 2005 accessed June 2005 Link
[85] NIST Special Publication 800-38A, 2001 ED, Version 1, Recommendation for Block Cipher Modes of Operation—Methods and Techniques, December 2001, Natl. Inst.Stand. Technol. [Web page], http://www.csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf Link
[86] D. McGrew, J. Viega, The Galois/Counter Mode of Operation (GCM), Natl. Inst. Stand. Technol. [Web page], http://www.csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-revised-spec.pdf, May 31, 2005 Link
[87] National Institute of Standards and Technology and Communications Security Establishment, Implementation Guidance for FIPS Pub. 140-2 and the Cryptographic Module Validation Program, Natl. Inst. Stand. Technol. [Web page], http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf Link

TỪ KHÓA LIÊN QUAN

TRÍCH ĐOẠN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w