Securing IP networks

被引:0
|
作者
Xirasagar S. [1 ]
Mojtahed M. [1 ]
机构
[1] LSI Corporation, United States
关键词
D O I
10.1016/S1353-4858(10)70016-7
中图分类号
学科分类号
摘要
In part one of this two-part series on securing IP networks, the issues and technologies involved with securing these networks were addressed. We discussed how the evolution of packet-switched networks has driven the need for scalable security solutions. In this second and final installment, we'll address the necessary specifications for the silicon, software and hardware platforms that can enable applications with packet processing at up to 3Gbps and IPsec processing at up to 1.5Gbps for all applications. © 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:13 / 17
页数:4
相关论文
共 50 条
  • [31] Securing all-optical networks
    Rejeb, R
    Pavlosoglou, I
    Leeson, MS
    Green, RJ
    ICTON 2003: 5TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 1, PROCEEDINGS, 2003, : 87 - 90
  • [32] Securing mobile networks in an operational setting
    Ivancic, WD
    Shell, D
    CCW 2003: IEEE 18TH ANNUAL WORKSHOP ON COMPUTER COMMUNICATIONS, PROCEEDINGS, 2003, : 139 - 147
  • [33] On Securing Underwater Acoustic Networks: A Survey
    Jiang, Shengming
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 729 - 752
  • [34] Securing Networks using Quantum Cryptography
    Chaudhuri, Kostav
    Singh, Tanya
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [35] Securing manufacturing data on enterprise networks
    Anon
    Control Solutions, 2001, 74 (09):
  • [36] Securing Academic Freedom through Networks
    Boele-Woelki, Katharina
    Fisher, Cathleen
    Pape, Hans-Christian
    Francisco, Joseph S.
    ANGEWANDTE CHEMIE-INTERNATIONAL EDITION, 2019, 58 (25) : 8246 - 8248
  • [37] Securing Sensor Networks by Moderating Frequencies
    Sarkar, Pinaki
    Mahish, Priyatosh
    Chowdhury, Morshed Uddin
    Sakurai, Kouichi
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 173 - 185
  • [38] Brief Announcement: Securing Social Networks
    Backes, Michael
    Maffei, Matteo
    Pecina, Kim
    PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 341 - 342
  • [39] Securing manufacturing data on enterprise networks
    Sierer, B
    CONTROL SOLUTIONS, 2001, 74 (09): : 30 - +
  • [40] Securing vehicular ad hoc networks
    Raya, Maxim
    Hubaux, Jean-Pierre
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (01) : 39 - 68