Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14365/3666
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKondakçı, Süleyman-
dc.contributor.authorYilmaz G.-
dc.date.accessioned2023-06-16T15:01:54Z-
dc.date.available2023-06-16T15:01:54Z-
dc.date.issued2010-
dc.identifier.isbn9.78145E+12-
dc.identifier.urihttps://doi.org/10.1145/1854099.1854105-
dc.identifier.urihttps://hdl.handle.net/20.500.14365/3666-
dc.descriptionMicrosoft Russia;Russian Foundation for Basic Researchen_US
dc.description3rd International Conference on Security of Information and Networks, SIN 2010 -- 7 September 2010 through 11 September 2010 -- Taganrog, Rostov-on-Don -- 82007en_US
dc.description.abstractWe present performance evaluation of two low level implementations of the RSEP protocol. The implementations are realized both in Java and C++ languages, while the test and evaluations are performed on two different CPU architectures, ARM and Intel ®. RSEP [21] is a security evaluation protocol used to assess security of remote systems over open and insecure networks such as the Internet. RSEP protocol provides an alternative approach to security test and evaluation, which mainly consists of a secure communication protocol, back-end services, and a variety of remote evaluation agents. Secure evaluation of remote entities/assets is a challenging issue with several important requirements such as interoperability, security, robustness, time-efficiency, and ease of applicability. Mobile agents running on hand-held ARM devices and Intel platforms perform the remote evaluation independent of time and location. Copyright 2010 ACM.en_US
dc.language.isoenen_US
dc.relation.ispartofSIN'10 - Proceedings of the 3rd International Conference of Security of Information and Networksen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectCryptographyen_US
dc.subjectSecurity evaluationen_US
dc.subjectSecurity protocolen_US
dc.subjectAlternative approachen_US
dc.subjectC++ languageen_US
dc.subjectCPU architectureen_US
dc.subjectInsecure networksen_US
dc.subjectLow levelen_US
dc.subjectPerformance evaluationen_US
dc.subjectRemote evaluationen_US
dc.subjectRemote systemsen_US
dc.subjectSecure communicationsen_US
dc.subjectSecurity evaluationen_US
dc.subjectSecurity protocolsen_US
dc.subjectTest and evaluationen_US
dc.subjectTime efficienciesen_US
dc.subjectCommunicationen_US
dc.subjectCryptographyen_US
dc.subjectFrequency hoppingen_US
dc.subjectInternet protocolsen_US
dc.subjectJava programming languageen_US
dc.subjectMobile agentsen_US
dc.subjectNetwork securityen_US
dc.titleImplementation and performance evaluation of the RSEP protocol on ARM and Intel platformsen_US
dc.typeConference Objecten_US
dc.identifier.doi10.1145/1854099.1854105-
dc.identifier.scopus2-s2.0-77958057868en_US
dc.authorscopusid15061511300-
dc.identifier.startpage194en_US
dc.identifier.endpage202en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityN/A-
dc.identifier.wosqualityN/A-
item.grantfulltextreserved-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.fulltextWith Fulltext-
item.languageiso639-1en-
crisitem.author.dept05.05. Computer Engineering-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Files in This Item:
File SizeFormat 
2752.pdf
  Restricted Access
505.71 kBAdobe PDFView/Open    Request a copy
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

1
checked on Oct 2, 2024

Page view(s)

74
checked on Sep 30, 2024

Download(s)

6
checked on Sep 30, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.