Key technologies in information security - A review

被引:0
|
作者
Athisha, G [1 ]
Sankaranarayanan, K
机构
[1] PSNA Coll Engn & Technol, Dept ECE, Dindigul 6246222, India
[2] AC Coll Engn & Technol, Dept ECE, Karaikkudi 630004, Tamil Nadu, India
关键词
Authentication - Block-permutators - Communication infrastructure - Cryptographic engines;
D O I
10.1080/02564602.2005.11657899
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The accelerating development of communication technologies has increased the speed, quality and ease of global communication. The evolution of networking technologies show that the, Internet is the single integrated communication infrastructure. But as dependability on networks increases, new security vulnerabilities are developed every minute. To defend ourselves from cyberthreats, appropriate information security measures have to be developed. Earlier work on information security dates back to 4000 years with the development of cryptography. Firewalls, proxying and authentication systems constitute the next phase. The protection of copyrights and intellectual properties of digital entertainment contents and business transaction informations have also, to be considered as serious issues. Compromising the security of routing infrastructure may lead to invasion of the goal of a communication system. The next generation embedded, processors can implement the cryptographic engines at wire-speed. This paper presents a brief review of some of the key technologies used to secure the valuable information.
引用
收藏
页码:173 / 181
页数:9
相关论文
共 50 条
  • [1] Security technologies on image information (6); symmetric key encryption
    Watanabe, Dai
    [J]. Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, 2015, 69 (07): : 553 - 559
  • [2] Analysis of the Key Technologies and Information Security of the 220kV Digital Information Substation
    Cai, Guihua
    Song, Tianmin
    Wang, Zhigang
    [J]. MECHATRONICS AND INTELLIGENT MATERIALS II, PTS 1-6, 2012, 490-495 : 100 - +
  • [3] A Review of Key Technologies for Emotion Analysis Using Multimodal Information
    Zhu, Xianxun
    Guo, Chaopeng
    Feng, Heyang
    Huang, Yao
    Feng, Yichen
    Wang, Xiangyang
    Wang, Rui
    [J]. COGNITIVE COMPUTATION, 2024, 16 (04) : 1504 - 1530
  • [4] A taxonomy for information security technologies
    Venter, HS
    Eloff, JHP
    [J]. COMPUTERS & SECURITY, 2003, 22 (04) : 299 - 307
  • [5] Applied information security technologies
    Yoshida, Yoshihiro
    Takeuchi, Hironori
    [J]. 2003, Nippon Telegraph and Telephone Corp. (15):
  • [6] Applied information security technologies
    Yoshida, Y
    Takeuchi, H
    [J]. NTT REVIEW, 2003, 15 (01): : 15 - 20
  • [7] Mix of technologies key to increased security
    Phillips, EH
    [J]. AVIATION WEEK & SPACE TECHNOLOGY, 1996, 145 (15): : 50 - 52
  • [8] Key technologies for the information industry
    Ralph, B
    [J]. BRITISH TELECOMMUNICATIONS ENGINEERING, 1996, 15 : 38 - 38
  • [9] Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review
    Shojaei, Parisasadat
    Vlahu-Gjorgievska, Elena
    Chow, Yang-Wai
    [J]. COMPUTERS, 2024, 13 (02)
  • [10] A Review on Information, Information Security and Security Processes
    Canbek, Gurol
    Sagiroglu, Seref
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2006, 9 (03): : 165 - 174