2020 Information Communication Technologies Conference (ICTC) 2020
DOI: 10.1109/ictc49638.2020.9123251
|View full text |Cite
|
Sign up to set email alerts
|

Flexible Encryption for Reliable Transmission Based on the P4 Programmable Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Text classification has its own unique processing methods in data mining, such as de-illegal characters, de-stop words, word segmentation, and word vector encoding. This project first carried out the operations of converting dates to a unified format, merging and deduplication of multiple files, extracting the text and labels required for text classification, replacing illegal characters for the extracted text data, removing punctuation, garbled codes, etc., and replacing the special combination of English and numbers with a unified --, and then using stuttering words, the Chinese text was segmented, and the phrases after the word segmentation were removed Chinese common stop words [3].…”
Section: Methodsmentioning
confidence: 99%
“…Text classification has its own unique processing methods in data mining, such as de-illegal characters, de-stop words, word segmentation, and word vector encoding. This project first carried out the operations of converting dates to a unified format, merging and deduplication of multiple files, extracting the text and labels required for text classification, replacing illegal characters for the extracted text data, removing punctuation, garbled codes, etc., and replacing the special combination of English and numbers with a unified --, and then using stuttering words, the Chinese text was segmented, and the phrases after the word segmentation were removed Chinese common stop words [3].…”
Section: Methodsmentioning
confidence: 99%
“…Data encryption can also happen in the P4 switch. To this purpose, there are multiple available algorithms that encrypt the connection in a P4 switch and can also be deployed in this work [28][29][30].…”
Section: Cluster Computingmentioning
confidence: 99%
“…Using the built-in outdated hash algorithm CRC-32 which is designed to calculate checksum rather than an encrypted hash algorithm Traditional encryption strategies cannot dynamically encrypt packets based on their importance. Qin et al [56] propose a scheme of updating security policy according to the different traffic distribution and types in the network. When the first packet of each new flow reaches the P4 switch, the P4 switch sends a request to the controller.…”
Section: Information Hiding Nethidementioning
confidence: 99%