2009 International Conference on Information Technology and Computer Science 2009
DOI: 10.1109/itcs.2009.307
View full text |Buy / Rent full text
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…TCP/IP network model separates networking functions into distinct layers and each layer executes a specific function. Transport Layer Security (TLS) or Secure Sockets Layer (SSL) and Secure Shell (SSH) both are very popular used for security protocols performs on transport and application layers respectively [39][40][41][42]. All protocols recommend security to any heterogeneous application through general security services of key replace, authentication, data integrity and confidentiality.…”
Section: Security Overhead Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…TCP/IP network model separates networking functions into distinct layers and each layer executes a specific function. Transport Layer Security (TLS) or Secure Sockets Layer (SSL) and Secure Shell (SSH) both are very popular used for security protocols performs on transport and application layers respectively [39][40][41][42]. All protocols recommend security to any heterogeneous application through general security services of key replace, authentication, data integrity and confidentiality.…”
Section: Security Overhead Modelmentioning
confidence: 99%
“…Security level 1 represents the weakest security whereas security level 9 represents the strongest security. The lists of the cipher suites are favored order for choice by a TLS (version1.2 implementation) within each security level [39][40][41][42]47]. Without loss of generality, we assume that the worst-case execution time Eij is the completion time of i th task without having its security overhead in place.…”
Section: Security Overhead Modelmentioning
confidence: 99%
“…Clients need to be granted by the authentication server (Auth Server) in order to subsequently access the application servers (App Server). handshake involves computationally heavy cryptographic procedures (at the server side) that may be difficult to deal with when the number of clients is high [Qing and Yaping 2009;Shacham and Boneh 2001]. Moreover, we observe that other scenarios are affected by the performance of the TLS/SSL authentication: e.g., Shen et al [2012] studied the impact of TLS on SIP server performance and showed that using TLS can reduce the performance by up to a factor of 17 compared to the typical case of SIP-over-UDP.…”
Section: Problem Statementmentioning
confidence: 99%