M. Franeková, P. Holecko, E. Bubeníková, A. Kanáliková
{"title":"C2C通信中的传输场景分析侧重于安全方面","authors":"M. Franeková, P. Holecko, E. Bubeníková, A. Kanáliková","doi":"10.1109/SAMI.2017.7880354","DOIUrl":null,"url":null,"abstract":"In the paper the authors focus on models construction of transport scenarios with orientation to security analysis of C2C communications. In the practical part two transport scenarios are analysed on a sample of real captured transport data via Riverbed Modeler tool. The computational complexity of ECDSA digital signature schemes was determined according to several selected EC curves and the efficiency of a PC. For the worst case transport scenario, the parameters throughput of network and delay between transmitted and received messages were analysed according to the number of nodes and message lengths.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Transport scenarios analysis within C2C communications focusing on security aspects\",\"authors\":\"M. Franeková, P. Holecko, E. Bubeníková, A. Kanáliková\",\"doi\":\"10.1109/SAMI.2017.7880354\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the paper the authors focus on models construction of transport scenarios with orientation to security analysis of C2C communications. In the practical part two transport scenarios are analysed on a sample of real captured transport data via Riverbed Modeler tool. The computational complexity of ECDSA digital signature schemes was determined according to several selected EC curves and the efficiency of a PC. For the worst case transport scenario, the parameters throughput of network and delay between transmitted and received messages were analysed according to the number of nodes and message lengths.\",\"PeriodicalId\":105599,\"journal\":{\"name\":\"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)\",\"volume\":\"76 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAMI.2017.7880354\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAMI.2017.7880354","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Transport scenarios analysis within C2C communications focusing on security aspects
In the paper the authors focus on models construction of transport scenarios with orientation to security analysis of C2C communications. In the practical part two transport scenarios are analysed on a sample of real captured transport data via Riverbed Modeler tool. The computational complexity of ECDSA digital signature schemes was determined according to several selected EC curves and the efficiency of a PC. For the worst case transport scenario, the parameters throughput of network and delay between transmitted and received messages were analysed according to the number of nodes and message lengths.