1997
DOI: 10.1006/jnca.1997.0058
|View full text |Cite
|
Sign up to set email alerts
|

A fundamental framework for network security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2003
2003
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…(1) Encryption speed. For the RSA algorithm, to ensure security, its modulus n needs to be at least 1024 bits, then a large number of large integer multiplication and modulo operations are required, the time required for the RSA algorithm to encrypt and decrypt 1M (vehicle information in the Internet of Vehicles) files has been greater than 100s, the following mainly simulates the DES algorithm, the AES algorithm and the AES and RSA hybrid algorithm on MATLAB [27]. The results are shown in Figure 4.2.…”
Section: Performance Analysis Of Encryption Algorithmsmentioning
confidence: 99%
“…(1) Encryption speed. For the RSA algorithm, to ensure security, its modulus n needs to be at least 1024 bits, then a large number of large integer multiplication and modulo operations are required, the time required for the RSA algorithm to encrypt and decrypt 1M (vehicle information in the Internet of Vehicles) files has been greater than 100s, the following mainly simulates the DES algorithm, the AES algorithm and the AES and RSA hybrid algorithm on MATLAB [27]. The results are shown in Figure 4.2.…”
Section: Performance Analysis Of Encryption Algorithmsmentioning
confidence: 99%
“…Schummacher and Ghosh [32] have defined eight pillars as the components of the information security: systematic, communication, physical, personnel, application, performance, design correctness; and nine attributes: privacy, integrity, accountability, reliability, connectivity, recovery, liability, and uncertainty. Pfleeger [29] also groups the potential threats to a network into eight categories: wiretapping, impersonation, message confidentiality violations, message integrity violations, hacking, code integrity, and denial of service.…”
Section: A Review Of Existing Taxonomiesmentioning
confidence: 99%
“…Network security (see, e.g., [1, 2]) has been studied extensively. In wireless networks, security problems are especially critical, because wireless channels are inherently broadcast channels.…”
Section: Introductionmentioning
confidence: 99%