http://iet.metastore.ingenta.com
1887

High-speed security

High-speed security

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Communications Engineer — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Most companies today take the risks of unwanted network intrusion, theft, sabotage and malicious damage very seriously. Historically, only high-end networking equipment required, or could justify, the additional cost of implementing security features onto a final network design. However, the explosion of home networking and the growing number of connected users, and hence possible system attacks, have produced a widespread requirement for low-cost, high-performance security solutions. Different applications have, of course, different security requirements for data privacy, integrity and authentication. In today's communications networks, populated by applications demanding increasing amounts of bandwidth, the ultimate goal of a transparent security processing solution in the end system is impossible to achieve through software. A high-performing secure solution can only be achieved through the use of some form of hardware assistance, specifically designed to off-load the main CPU or network processor from performing the required mathematically intensive security algorithms. The article reviews some of the options.

http://iet.metastore.ingenta.com/content/journals/10.1049/ce_20040207
Loading

Related content

content/journals/10.1049/ce_20040207
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address