Performance evaluation of INDECT security architecture
Evaluación del rendimiento de la arquitectura de seguridad INDECT
dc.creator | Machník, Petr | |
dc.creator | Niemiec, Marcin | |
dc.creator | Urueña, Manuel | |
dc.creator | Stoianov, Nikolai | |
dc.date.accessioned | 2022-09-28T14:15:54Z | |
dc.date.available | 2022-09-28T14:15:54Z | |
dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/3656113 | |
dc.language | eng | |
dc.publisher | Universidad Santo Tomás. Seccional Bucaramanga | |
dc.relation | http://revistas.ustabuca.edu.co/index.php/ITECKNE/article/view/1962/1525 | |
dc.relation | /*ref*/INDECT Project, http://www.indect-project.eu | |
dc.relation | /*ref*/M. Urueña, P. Machník, M. Niemiec, N. Stoianov, “INDECT Security Architecture,” Multimedia Communications, Services and Security, CCIS, vol. 368, pp. 273-287, 2013. Heidelberg: Springer | |
dc.relation | /*ref*/M. Niemiec, L. Machowski, “A new symmetric block cipher based on key-dependent S-boxes,” International Congress on Ultra-Modern Telecommunications and Control Systems, ICUMT 2012, pp. 474-478, Saint Petersburg, 2012. | |
dc.relation | /*ref*/N. Stoianov, M. Urueña, M. Niemiec, P. Machník, G. Maestro, “Integrated security infrastructures for law enforcement agencies,” Multimedia Tools and Applications, vol. 74, pp. 4453-4468, 2015. Springer. | |
dc.relation | /*ref*/C. Adams, S. Lloyd, Understanding PKI: Concepts, Standards, and Deployment Considerations, 2nd ed., Addison Wesley, 2002. | |
dc.relation | /*ref*/OpenVPN, http://openvpn.net/index.php/open-source.html | |
dc.relation | /*ref*/StrongSwan, http://www.strongswan.org | |
dc.relation | /*ref*/N. Stoianov, M. Urueña, M. Niemiec, P. Machník, G. Maestro, “Security Infrastructures: Towards the INDECT System Security,” Multimedia Communications, Services and Security. CCIS, vol. 287, pp. 304-315, 2012. Heidelberg: Springer. | |
dc.relation | /*ref*/INDECT Consortium. D9.44: New methods of error detection, February, 2014. | |
dc.relation | /*ref*/M. Niemiec, J. Dudek, L. Romański, M. Święty, “Towards hardware implementation of INDECT Block Cipher,” Multimedia Communications, Services and Security. CCIS, vol. 287, pp. 252-261, 2012. Heidelberg: Springer. | |
dc.relation | /*ref*/G. Apostolopoulos, V. Peris, D. Saha, “Transport layer security: how much does it really cost?” Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’99), vol. 2, pp. 717-725, New York, 1999. | |
dc.relation | /*ref*/C. Coarfa, P. Druschel, DS Wallach, “Performance Analysis of TLS Web Servers,” ACM Transactions on Computer Systems, vol. 24, no. 1, pp. 39-69, 2006. | |
dc.relation | /*ref*/H. Kleppe, “Performance impact of deploying HTTPS,” Technical Report. Universiteit van Amsterdam, 2011. | |
dc.rights | Copyright (c) 2018 ITECKNE | |
dc.source | ITECKNE; Vol 15, No 1 (2018); 34-42 | |
dc.source | 2339-3483 | |
dc.source | 1692-1798 | |
dc.source | ITECKNE; Vol 15, No 1 (2018); 34-42 | |
dc.title | Performance evaluation of INDECT security architecture | |
dc.title | Evaluación del rendimiento de la arquitectura de seguridad INDECT | |
dc.type | info:eu-repo/semantics/article | |
dc.type | info:eu-repo/semantics/publishedVersion |