Movatterモバイル変換


[0]ホーム

URL:


Tisovsky et al., 2012 - Google Patents

Analytical model of IPsec process throughput

Tisovsky et al., 2012

ViewPDF
Document ID
15237544663068712524
Author
Tisovsky A
Baronak I
Publication year
Publication venue
Advances in Electrical and Electronic Engineering

External Links

Snippet

The paper concerns with throughput of securing process, which cannot be described neither by a constant value of bits per second nor by a constant value of packets per second over the range of packet sizes. We propose general throughput model of IPsec process based on …
Continue reading atadvances.vsb.cz (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/24Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
    • H04L47/2441Flow classification

Similar Documents

PublicationPublication DateTitle
US8898451B2 (en)Method and system for monitoring encrypted data transmissions
US11805097B2 (en)Decrypting transport layer security traffic without Man-in-the-Middle proxy
US11085964B2 (en)Systems and methods for intellectual property-secured, remote debugging
US11153289B2 (en)Secure communication acceleration using a System-on-Chip (SoC) architecture
Pudelko et al.Performance analysis of VPN gateways
US11374973B2 (en)Streamlining cryptographic processes in a test environment
Groen et al.Securing O-RAN open interfaces
US20230403136A1 (en)Computer and Network Interface Controller Securely Offloading Encryption Keys and Encryption Processing to the Network Interface Controller
Zeidler et al.Performance evaluation of transport layer security in the 5G core control plane
CN108718268B (en)Method for improving concurrent processing performance of VPN (virtual private network) server
Zhao et al.On the (dis) advantages of programmable nics for network security services
Gallenmüller et al.DTLS Performance-How Expensive is Security?
Tisovsky et al.Analytical model of IPsec process throughput
Ha et al.ASIC design of IPSec hardware accelerator for network security
Feghali et al.Security: Adding Protection to the Network via the Network Processor.
Sabbagh et al.Evaluation of WireGuard and OpenVPN VPN solutions
CA2592713C (en)Method and system for monitoring encrypted data transmissions
VoraSide-channel security in networks: from the internet to interconnects
Da-Yuan et al.Implementation and performance evaluation of IPSec VPN based on netfilter
TuovinenFPGA implementation of confidential computing enclave
Moghimifar et al.Predicting tls performance from key exchange performance: short paper
ZouNetwork performance and key management of VPN tunnels between autonomous vehicles
Dabi et al.Enabling Support for TLS and TLS Fingerprinting in Network Stack Tester
Zhao et al.MIKA: A Minimalist Approach to Hybrid Key Exchange
Pudelko et al.Performance Analysis of VPN Gateways Performanceanalyse von VPN Gateways

[8]
ページ先頭

©2009-2025 Movatter.jp