Haraty et al., 2015 - Google Patents
The NetCamo data communication systemHaraty et al., 2015
View DOC- Document ID
- 13413815631885401144
- Author
- Haraty R
- Zantout B
- Publication year
- Publication venue
- Advanced Science Letters
External Links
Snippet
Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order …
- 238000004891 communication 0 title abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Islam et al. | Distblacknet: A distributed secure black sdn-iot architecture with nfv implementation for smart cities | |
Cao et al. | Understanding internet DDoS mitigation from academic and industrial perspectives | |
Shameli-Sendi et al. | Taxonomy of distributed denial of service mitigation approaches for cloud computing | |
Guan et al. | NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications | |
Imran et al. | Reducing the effects of DoS attacks in software defined networks using parallel flow installation | |
Zhu et al. | Efficient anonymous communication in SDN-based data center networks | |
Shoeb et al. | Resource management of switches and controller during saturation time to avoid DDoS in SDN | |
Henecka et al. | Strip: Privacy-preserving vector-based routing | |
Tourani et al. | Towards security-as-a-service in multi-access edge | |
Karim et al. | Secure multipath mutation SMPM in moving target defense based on SDN | |
Wyss et al. | Secure and scalable QoS for critical applications | |
Saharan et al. | Prevention of DrDoS amplification attacks by penalizing the attackers in SDN environment | |
Dayananda et al. | Architecture for inter-cloud services using IPsec VPN | |
Aytaç et al. | Authenticated quality of service aware routing in software defined networks | |
Haraty et al. | The NetCamo data communication system | |
Scherrer et al. | Security, anonymity, privacy, and trust | |
Paschos et al. | Sustainability of service provisioning systems under stealth DoS attacks | |
Zarezadeh et al. | Preserving privacy of software-defined networking policies by secure multi-party computation | |
Sangeetha et al. | Defense against protocol level attack in Tor network using deficit round robin queuing process | |
Zhu et al. | MIC: An efficient anonymous communication system in data center networks | |
CN108234495B (en) | Network bandwidth allocation method based on multidimensional attribute of autonomous system | |
Almohaimeed et al. | A novel moving target defense technique to secure communication links in software-defined networks | |
Sollins et al. | Exploring the Intersection of Technology and Policy in the Future Internet Architecture Effort | |
Othman et al. | Enhancing control model to ease off centralized control of flow-based SDNs | |
Nikolchev et al. | Method of Routing Functions Virtualization in the Modern Networks. |