Asynchronous transfer mode: solution for broadband ISDN
Asynchronous transfer mode: solution for broadband ISDN
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Secure communications in ATM networks
Communications of the ACM
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Securing communications over ATM networks
SEC'97 Proceedings of the IFIP TC11 13 international conference on Information Security (SEC '97) on Information security in research and business
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Overload generated by signaling message flows in ATM networks
PICS '98 Proceedings of the IFIP TC6/WG6.3 Seventh International Conference on Performance of Information and Communication Systems
Hi-index | 0.00 |
In current ATM, networks the security issues are gaining a broad attention. For a higher customer satisfaction, the service providers must guarantee the security of the user data. Unless the existing proposals, the method proposed here realizes both the security and integrity services in the ATM layer, so it allows data integrity check in the intermediate network components, too. All the information needed for data integrity is carried in special ATM cells, inserted in the user data flow. At the same time, these special cells make the renegotiation of security service parameters possible. Our model was validated through simulations.