236 resultados para Hardware IP Security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Voice over IP (VoIP) has experienced a tremendous growth over the last few years and is now widely used among the population and for business purposes. The security of such VoIP systems is often assumed, creating a false sense of privacy. This paper investigates in detail the leakage of information from Skype, a widely used and protected VoIP application. Experiments have shown that isolated phonemes can be classified and given sentences identified. By using the dynamic time warping (DTW) algorithm, frequently used in speech processing, an accuracy of 60% can be reached. The results can be further improved by choosing specific training data and reach an accuracy of 83% under specific conditions. The initial results being speaker dependent, an approach involving the Kalman filter is proposed to extract the kernel of all training signals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A full hardware implementation of a Weighted Fair Queuing (WFQ) packet scheduler is proposed. The circuit architecture presented has been implemented using Altera Stratix II FPGA technology, utilizing RLDII and QDRII memory components. The circuit can provide fine granularity Quality of Service (QoS) support at a line throughput rate of 12.8Gb/s in its current implementation. The authors suggest that, due to the flexible and scalable modular circuit design approach used, the current circuit architecture can be targeted for a full ASIC implementation to deliver 50 Gb/s throughput. The circuit itself comprises three main components; a WFQ algorithm computation circuit, a tag/time-stamp sort and retrieval circuit, and a high throughput shared buffer. The circuit targets the support of emerging wireline and wireless network nodes that focus on Service Level Agreements (SLA's) and Quality of Experience.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Links between political violence and children's adjustment problems are well-documented. However, the mechanisms by which political tension and sectarian violence relate to children's well-being and development are little understood. This study longitudinally examined children's emotional security about community violence as a possible regulatory process in relations between community discord and children's adjustment problems. Families were selected from 18 working class neighborhoods in Belfast, Northern Ireland. Participants (695 mothers and children, M=12.17, SD=1.82) were interviewed in their homes over three consecutive years. Findings supported the notion that politically-motivated community violence has distinctive effects on children's externalizing and internalizing problems through the mechanism of increasing children's emotional insecurity about community. Implications are considered for understanding relations between political violence and child adjustment from a social ecological perspective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article argues that Critical Security Studies (CSS), exemplified by Ken Booth’s Theory of World Security, has outlined an ethics of security as emancipation of the ‘human’, but also a highly problematic security of ethics. After drawing out how the ethics of CSS operates, we examine the security of this ethics by examining it against a hard case, that of the 199899 Kosovo crisis. Confronting this concrete situation, we draw out three possibilities for action used at the time to secure the human: ‘humanitarian containment’, military intervention and hospitality. Assessing each against Booth’s requirements for ethical security action, we counter that, in fact, no option was without risks, pitfalls and ambiguities. Ultimately, if any action to promote the security and the emancipation of the human is possible, it must embrace and prioritise the fundamental insecurity of ethics, or else find itself paralysed through a fear of making situations worse.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new type of advanced encryption standard (AES) implementation using a normal basis is presented. The method is based on a lookup technique that makes use of inversion and shift registers, which leads to a smaller size of lookup for the S-box than its corresponding implementations. The reduction in the lookup size is based on grouping sets of inverses into conjugate sets which in turn leads to a reduction in the number of lookup values. The above technique is implemented in a regular AES architecture using register files, which requires less interconnect and area and is suitable for security applications. The results of the implementation are competitive in throughput and area compared with the corresponding solutions in a polynomial basis.