A simple unpredictable pseudo random number generator
SIAM Journal on Computing
Using one-way functions for authentication
ACM SIGCOMM Computer Communication Review
An efficient and secure authentication protocol using uncertified keys
ACM SIGOPS Operating Systems Review
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
Reconfigurable Implementation of Elliptic Curve Crypto Algorithms
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
A hybrid authentication protocol for large mobile network
Journal of Systems and Software
Analyzing security protocols with secrecy types and logic programs
Journal of the ACM (JACM)
Security analysis of network protocols: logical and computational methods
PPDP '05 Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming
A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk Management
IWIA '06 Proceedings of the Fourth IEEE International Workshop on Information Assurance
ACM Transactions on Computational Logic (TOCL)
Verified interoperable implementations of security protocols
ACM Transactions on Programming Languages and Systems (TOPLAS)
Proceedings of the 15th ACM conference on Computer and communications security
A new efficient authentication protocol for mobile networks
Computer Standards & Interfaces
Deciding security properties for cryptographic protocols. application to key cycles
ACM Transactions on Computational Logic (TOCL)
Modular verification of security protocol code by typing
Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Efficient implementation of elliptic curve cryptography using low-power digital signal processor
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Intelligent network security assessment with modeling and analysis of attack patterns
Security and Communication Networks
Hi-index | 0.00 |
We present performance evaluation of two low level implementations of the RSEP protocol. The implementations are realized both in Java and C++ languages, while the test and evaluations are performed on two different CPU architectures, ARM and Intel®. RSEP [21] is a security evaluation protocol used to assess security of remote systems over open and insecure networks such as the Internet. RSEP protocol provides an alternative approach to security test and evaluation, which mainly consists of a secure communication protocol, back-end services, and a variety of remote evaluation agents. Secure evaluation of remote entities/assets is a challenging issue with several important requirements such as interoperability, security, robustness, time-efficiency, and ease of applicability. Mobile agents running on hand-held ARM devices and Intel platforms perform the remote evaluation independent of time and location.