{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:05:00Z","timestamp":1729641900612,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wcins.2010.5541820","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T15:51:40Z","timestamp":1281455500000},"page":"455-459","source":"Crossref","is-referenced-by-count":2,"title":["A network security system model based on FPGA"],"prefix":"10.1109","author":[{"family":"Bo Zhou","sequence":"first","affiliation":[]},{"family":"Wei Han","sequence":"additional","affiliation":[]},{"family":"Huafeng Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"The Design of Rijindael AES: The Advanced Encryption Standard","year":"2003","author":"daemen","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056591"},{"key":"ref12","article-title":"Computational method and Apparatus for finite field arithmetic","author":"omura","year":"1986","journal-title":"U S Patent"},{"key":"ref13","first-page":"297","article-title":"VLSI design for multiplication over finite fields GF(2m)","author":"mastrovito","year":"1988","journal-title":"Applied Alge-bra Algebraic Algorithms and Error-Correcting Codes 6th International Conference AAECC-6"},{"key":"ref14","article-title":"GF(2m) multiplication and division over the dual basis","author":"fen n","year":"1996","journal-title":"IEEE Trans on Computer"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SIPS.2001.957363"},{"article-title":"Hardware Implementation of Elliptic Curve Diffie-Hellman Key Agreement Scheme in GF(p)","year":"2008","author":"sangma","key":"ref16"},{"key":"ref17","article-title":"Hardware Implementation of Improved Montgomery's Modular Multiplication Algorithm","volume":"3","author":"zhang","year":"0","journal-title":"Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FPGA.2003.1227241"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2009.247"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.17487\/rfc3268","article-title":"Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS)","author":"chown","year":"2002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1046192.1046223"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(05)70254-2"},{"article-title":"EDA and Intergrated Circuit Engineering Design","year":"2009","author":"han","key":"ref5"},{"article-title":"The TCP\/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference","year":"2008","author":"kozierok","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.30"},{"key":"ref2","article-title":"Intrusion Prevention System Design","author":"zhang","year":"2004","journal-title":"Fourth International Conference on Computer and Information Technology"},{"article-title":"Intrusion Detection and Prevention Systems","year":"2007","author":"khawaja","key":"ref1"},{"key":"ref9","article-title":"File Type Detection Technology","author":"hickok","year":"2005","journal-title":"Proceedings from the 38th Midwest Instruction and Computing Symposium"},{"key":"ref20","article-title":"Implementations of High Throughput Sequential and Fully Pipelined AES Processors on FPGA","author":"fan","year":"0","journal-title":"Proceedings of 2007 International Symposium on Intelligent Signal Processing and Communication Systems"},{"key":"ref22","first-page":"158b","article-title":"IPSec Implementation on Xilinx Virtex-II Pro FPGA and Its Application","author":"lu","year":"2005","journal-title":"Proceedings 19th IEEE International Parallel and Distributed Processing Symposium"},{"key":"ref21","article-title":"High Throughput 32-bit AES Implementation in FPGA","author":"chang","year":"2008","journal-title":"IEEE Asia Pacific Conference on Circuit and System"},{"key":"ref23","article-title":"Efficient Hardware Realization of Advanced Encryption Standard Algorithm using Virtex-5 FPGA","volume":"9","author":"rais","year":"2009","journal-title":"IJCSNS International Journal of Computer Science and Network Security"}],"event":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)","start":{"date-parts":[[2010,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2010,6,27]]}},"container-title":["2010 IEEE International Conference on Wireless Communications, Networking and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5524730\/5541718\/05541820.pdf?arnumber=5541820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:04:29Z","timestamp":1559401469000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5541820\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/wcins.2010.5541820","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}