DTLS Performance - How Expensive is Security?
Sebastian GallenmüllerDominik SchöffmannDominik ScholzFabien GeyerGeorg CarlePublished in: CoRR (2019)
Keyphrases
- low cost
- rfid tags
- information security
- intrusion detection
- network security
- security issues
- access control
- genetic algorithm
- computationally expensive
- error prone
- neural network
- security policies
- database
- security analysis
- security properties
- risk analysis
- data sets
- high cost
- statistical databases
- security requirements
- encryption scheme
- security mechanisms
- key management
- social networks
- security protocols
- security level
- cryptographic protocols
- data mining
- high security
- information assurance