Security in computing
Architectural support for fast symmetric-key cryptography
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Building Internet Firewalls
Security in Computing
A Study of the Relative Costs of Network Security Protocols
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
A routing underlay for overlay networks
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
BANANAS: an evolutionary framework for explicit and multipath routing in the internet
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
LS-SCTP: a bandwidth aggregation technique for stream control transmission protocol
Computer Communications
Hi-index | 0.00 |
Data protection is an increasingly important issue in today's communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusively based on cryptography. As a complement, we propose the use of multiple physically separate paths to accomplish data protection. A general concept for providing physical separation of data streams together with a threat model is presented. The main target is delay-sensitive applications such as telephony signaling, live TV, and radio broadcasts that require only lightweight security. The threat considered is malicious interception of network transfers through so-called eavesdropping attacks. Application scenarios and techniques to provide physically separate paths are discussed.