Evaluación del rendimiento de la arquitectura de seguridad INDECT

dc.creatorMachník, Petr
dc.creatorNiemiec, Marcin
dc.creatorUrueña, Manuel
dc.creatorStoianov, Nikolai
dc.date.accessioned2022-09-28T14:15:54Z
dc.date.available2022-09-28T14:15:54Z
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/3656113
dc.languageeng
dc.publisherUniversidad Santo Tomás. Seccional Bucaramanga
dc.relationhttp://revistas.ustabuca.edu.co/index.php/ITECKNE/article/view/1962/1525
dc.relation/*ref*/INDECT Project, http://www.indect-project.eu
dc.relation/*ref*/M. Urueña, P. Machník, M. Niemiec, N. Stoianov, “INDECT Security Architecture,” Multimedia Communications, Services and Security, CCIS, vol. 368, pp. 273-287, 2013. Heidelberg: Springer
dc.relation/*ref*/M. Niemiec, L. Machowski, “A new symmetric block cipher based on key-dependent S-boxes,” International Congress on Ultra-Modern Telecommunications and Control Systems, ICUMT 2012, pp. 474-478, Saint Petersburg, 2012.
dc.relation/*ref*/N. Stoianov, M. Urueña, M. Niemiec, P. Machník, G. Maestro, “Integrated security infrastructures for law enforcement agencies,” Multimedia Tools and Applications, vol. 74, pp. 4453-4468, 2015. Springer.
dc.relation/*ref*/C. Adams, S. Lloyd, Understanding PKI: Concepts, Standards, and Deployment Considerations, 2nd ed., Addison Wesley, 2002.
dc.relation/*ref*/OpenVPN, http://openvpn.net/index.php/open-source.html
dc.relation/*ref*/StrongSwan, http://www.strongswan.org
dc.relation/*ref*/N. Stoianov, M. Urueña, M. Niemiec, P. Machník, G. Maestro, “Security Infrastructures: Towards the INDECT System Security,” Multimedia Communications, Services and Security. CCIS, vol. 287, pp. 304-315, 2012. Heidelberg: Springer.
dc.relation/*ref*/INDECT Consortium. D9.44: New methods of error detection, February, 2014.
dc.relation/*ref*/M. Niemiec, J. Dudek, L. Romański, M. Święty, “Towards hardware implementation of INDECT Block Cipher,” Multimedia Communications, Services and Security. CCIS, vol. 287, pp. 252-261, 2012. Heidelberg: Springer.
dc.relation/*ref*/G. Apostolopoulos, V. Peris, D. Saha, “Transport layer security: how much does it really cost?” Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’99), vol. 2, pp. 717-725, New York, 1999.
dc.relation/*ref*/C. Coarfa, P. Druschel, DS Wallach, “Performance Analysis of TLS Web Servers,” ACM Transactions on Computer Systems, vol. 24, no. 1, pp. 39-69, 2006.
dc.relation/*ref*/H. Kleppe, “Performance impact of deploying HTTPS,” Technical Report. Universiteit van Amsterdam, 2011.
dc.rightsCopyright (c) 2018 ITECKNE
dc.sourceITECKNE; Vol 15, No 1 (2018); 34-42
dc.source2339-3483
dc.source1692-1798
dc.sourceITECKNE; Vol 15, No 1 (2018); 34-42
dc.titlePerformance evaluation of INDECT security architecture
dc.titleEvaluación del rendimiento de la arquitectura de seguridad INDECT
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion


Este ítem pertenece a la siguiente institución