2014 International Conference on High Performance Computing and Applications (ICHPCA) 2014
DOI: 10.1109/ichpca.2014.7045309
|View full text |Cite
|
Sign up to set email alerts
|

Secured packet inspection with hierarchical pattern matching implemented using incremental clustering algorithm

Abstract: In the present scenario, most of the computing operations are performed over the Internet. Many companies provide their services using Internet, so networking services becomes more important these days. Hence, there is high demand for secured management of information, along with faster processing of operations. Due to increased demand for network services, there is a need to increase the performance of these services. The gradual increase in the amount of important information increases the packet payloads. E… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…In paper [6], the author proposed a new algorithm by combining the feature of paper [5] and SHA-256 algorithm so that less on chip memory space can be used along with the enhancement of informationsecurity. A proposed three tire model in paper [6]enhanced the security of information significantly. Hence it leads to efficient, secure and faster approach of data transmission.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In paper [6], the author proposed a new algorithm by combining the feature of paper [5] and SHA-256 algorithm so that less on chip memory space can be used along with the enhancement of informationsecurity. A proposed three tire model in paper [6]enhanced the security of information significantly. Hence it leads to efficient, secure and faster approach of data transmission.…”
Section: Introductionmentioning
confidence: 99%
“…In papers [6,7], the encryption and decryption process uses linear congruence method. Linear congruence method plays a very important role in many popular cryptography algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Paper [6] is about SHA-256 algorithm which was later known as Advanced Encryption Standard (AES). AES is one of the efficient algorithms that are very difficult to be cracked.…”
Section: Introductionmentioning
confidence: 99%
“…It needs sixteen rounds for encryption as well as decryption of information. In paper [7], the authors proposed an efficient algorithm by combining the feature of paper [5] and [6] so that information security will be maintained along with the reduction of on chip memory space. The proposed three tire model enhances the information security along with the faster SHA-256 was applied in infinite field.…”
Section: Introductionmentioning
confidence: 99%