2015
DOI: 10.1016/j.micpro.2015.05.007
|View full text |Cite
|
Sign up to set email alerts
|

Disposable configuration of remotely reconfigurable systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…Reconfigurable secure protocol (RSP), with adaptively dynamic protocol reconfiguration and flexible cryptogram resource configuration, 1,2 offers a great possibility of alleviating resources constrains, improving resources utilization and enhancing network security in SGIN. Security protocol reconfiguration (SPR) generates protocols by determining proper protocol flow and its components, picking cryptogram resources that satisfy the functional requirements and performance indexes for each component, and then assembling these selected resources in terms of the protocol flow.…”
Section: Introductionmentioning
confidence: 99%
“…Reconfigurable secure protocol (RSP), with adaptively dynamic protocol reconfiguration and flexible cryptogram resource configuration, 1,2 offers a great possibility of alleviating resources constrains, improving resources utilization and enhancing network security in SGIN. Security protocol reconfiguration (SPR) generates protocols by determining proper protocol flow and its components, picking cryptogram resources that satisfy the functional requirements and performance indexes for each component, and then assembling these selected resources in terms of the protocol flow.…”
Section: Introductionmentioning
confidence: 99%
“…Reconfigurable secure protocol (RSP), with adaptively dynamic protocol assembly and flexible resource configuration [1][2], could greatly improves resources utilization and enhances network security, especially in access points of spaceground integrated network (SGIN). Since performance of all components determine the efficiency of target protocol, the key issues in RSP is to determine the optimal secure access resources and corresponding protocol flow to generate the target protocol, which is defined as assembly decision-making problem (ADMP) in this paper.…”
Section: Introductionmentioning
confidence: 99%