Security-aware scheduling model for computational grid
Concurrency and Computation: Practice & Experience
LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload
ACM Transactions on Internet Technology (TOIT)
Security Driven Scheduling Model for Computational Grid Using NSGA-II
Journal of Grid Computing
Hi-index | 0.00 |
SSL/TLS servers are often overloaded with many simultaneous requests or Denial of Service (DoS) attack which will result in degradation of performance. So SSL/TLS servers have to utilize significantly more hardware in order to provide a reasonable response time to their customers. Instead of developing the hardware, it is always possible to look for faster algorithms in order to speed up decryption stages for improve SSL/TLS performance. In the paper, we investigate the performance and security of three algorithms in SSL/TLS handshake protocol. The solutions improve the performance without decrease security of the system or requiring expensive hardware. We provide detailed analyses of the three techniques and compare disadvantages of the three techniques. In particular, although increase some bandwidth and memory overhead to client, Client-aided RSA provide the best performance among the algorithms in SSL/TLS Handshake Protocol by transfer some cryptographic computation to client.