Performance-Directed iSCSI Security with Parallel Encryption.
Bo MaoDan FengSuzhen WuJianxi ChenLingfang ZengPublished in: AINA (2008)
Keyphrases
- encryption algorithms
- security properties
- encryption scheme
- encryption decryption
- key management
- high security
- data encryption
- encryption algorithm
- key exchange
- integrity verification
- stream cipher
- identity authentication
- digital rights management
- security requirements
- data confidentiality
- data security
- security analysis
- virtual private network
- private key
- information security
- secret key
- image encryption
- shared memory
- security level
- cryptographic protocols
- public key cryptography
- diffie hellman
- secure communication
- intrusion detection
- access control
- wireless networks
- security protocols
- parallel processing
- security issues
- parallel computing
- security policies
- parallel implementation
- statistical databases
- third party
- elliptic curve cryptography
- mutual authentication
- data protection
- public key
- security mechanisms
- ip networks
- ciphertext
- pseudorandom