[go: up one dir, main page]

Haraty et al., 2015 - Google Patents

The NetCamo data communication system

Haraty et al., 2015

View DOC
Document ID
13413815631885401144
Author
Haraty R
Zantout B
Publication year
Publication venue
Advanced Science Letters

External Links

Snippet

Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order …
Continue reading at www.researchgate.net (DOC) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing

Similar Documents

Publication Publication Date Title
Islam et al. Distblacknet: A distributed secure black sdn-iot architecture with nfv implementation for smart cities
Cao et al. Understanding internet DDoS mitigation from academic and industrial perspectives
Shameli-Sendi et al. Taxonomy of distributed denial of service mitigation approaches for cloud computing
Guan et al. NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications
Imran et al. Reducing the effects of DoS attacks in software defined networks using parallel flow installation
Zhu et al. Efficient anonymous communication in SDN-based data center networks
Shoeb et al. Resource management of switches and controller during saturation time to avoid DDoS in SDN
Henecka et al. Strip: Privacy-preserving vector-based routing
Tourani et al. Towards security-as-a-service in multi-access edge
Karim et al. Secure multipath mutation SMPM in moving target defense based on SDN
Wyss et al. Secure and scalable QoS for critical applications
Saharan et al. Prevention of DrDoS amplification attacks by penalizing the attackers in SDN environment
Dayananda et al. Architecture for inter-cloud services using IPsec VPN
Aytaç et al. Authenticated quality of service aware routing in software defined networks
Haraty et al. The NetCamo data communication system
Scherrer et al. Security, anonymity, privacy, and trust
Paschos et al. Sustainability of service provisioning systems under stealth DoS attacks
Zarezadeh et al. Preserving privacy of software-defined networking policies by secure multi-party computation
Sangeetha et al. Defense against protocol level attack in Tor network using deficit round robin queuing process
Zhu et al. MIC: An efficient anonymous communication system in data center networks
CN108234495B (en) Network bandwidth allocation method based on multidimensional attribute of autonomous system
Almohaimeed et al. A novel moving target defense technique to secure communication links in software-defined networks
Sollins et al. Exploring the Intersection of Technology and Policy in the Future Internet Architecture Effort
Othman et al. Enhancing control model to ease off centralized control of flow-based SDNs
Nikolchev et al. Method of Routing Functions Virtualization in the Modern Networks.