This paper evaluates the performance of the key elements of the security architecture developed by the INDECT project. In particular it first evaluates three different concurrent error detection mechanism (parity check, Berger code, and cyclic redundancy check) developed in software- and hardware-based implementations of the INDECT block cipher. It also analyses the performance hit in secure web servers when enabling TLS/SSL with mutual authentication. Finally, it evaluates the throughput and delay of traffic in the virtual private network based on the OpenVPN software package with the implemented INDECT block cipher. The results of these evaluations demonstrate that the proposed mechanisms, and by extension the whole INDECT security archit...
Kerberos is a network authentication protocol that was developed by MIT and now widely used by vario...
The heterogeneity and complexity of modern networks and services urge the requirement for flexible a...
While the benefits of using IPsec to solve a significant number of network security problems are wel...
DOI nefunkční (9.7.2018)This paper evaluates the performance of the key elements of the security arc...
This paper evaluates the performance of the key elements of the security architecture developed by t...
Published online: 22 June 2013. This paper is an improved version of “Security Infrastructures: Tow...
The objective of this project is implementation and performance evaluation of an SSL VPN taking int...
The goal of this thesis is to analyze the technologies for distributed computing in password crackin...
The intrusion detection systems and intrusion prevention systems (IDS / IPS) are the latest tools of...
Transport Layer Security (TLS) is a protocol that is widely used to secure Hypertext Transfer Protoc...
Περιέχει βιβλιογραφικές παραπομπές.Network Security is a fast growing sector of computer networks. T...
La criptografía moderna busca garantizar la confidencialidad de la información y prevenir que person...
This paper presents and experimentally evaluates two paralleliza-tion strategies for the popular ope...
Software Defined Networking (SDN) provides features such as network-visibility, centralized manageme...
This thesis discusses how the protocol suite IPSec could be implemented efficiently in a network s...
Kerberos is a network authentication protocol that was developed by MIT and now widely used by vario...
The heterogeneity and complexity of modern networks and services urge the requirement for flexible a...
While the benefits of using IPsec to solve a significant number of network security problems are wel...
DOI nefunkční (9.7.2018)This paper evaluates the performance of the key elements of the security arc...
This paper evaluates the performance of the key elements of the security architecture developed by t...
Published online: 22 June 2013. This paper is an improved version of “Security Infrastructures: Tow...
The objective of this project is implementation and performance evaluation of an SSL VPN taking int...
The goal of this thesis is to analyze the technologies for distributed computing in password crackin...
The intrusion detection systems and intrusion prevention systems (IDS / IPS) are the latest tools of...
Transport Layer Security (TLS) is a protocol that is widely used to secure Hypertext Transfer Protoc...
Περιέχει βιβλιογραφικές παραπομπές.Network Security is a fast growing sector of computer networks. T...
La criptografía moderna busca garantizar la confidencialidad de la información y prevenir que person...
This paper presents and experimentally evaluates two paralleliza-tion strategies for the popular ope...
Software Defined Networking (SDN) provides features such as network-visibility, centralized manageme...
This thesis discusses how the protocol suite IPSec could be implemented efficiently in a network s...
Kerberos is a network authentication protocol that was developed by MIT and now widely used by vario...
The heterogeneity and complexity of modern networks and services urge the requirement for flexible a...
While the benefits of using IPsec to solve a significant number of network security problems are wel...