Evaluation of Security Protocols Implementations
What we offer:
The use of security protocols and architectures arise new problems, as interoperability between the different implementations, or a greater predisposition to suffer attacks that saturate the available computing resources, stand out.
This project puts forward a methodology that allows assessing the level of conformity with the standard of the implementation of a security protocol or architecture and, at the same time, evaluating the performance of said solution. Moreover, the specific goals are: Conformity analysis, Interoperability and Performance. In order to develop the methodology, firstly the identification of parameters that influence on conformity with the standard and performance is carried out.
What we are looking for:
The Group looks for Technical cooperation and/or Commercial agreement with technical assistance with organizations or companies within the telecommunications sector as well as those on the Information and Telecommunications security sector.
The potential target companies of the described procedure mainly fall into two different groups:
1) Any kind of organizations having equipment for the protection of communications
2) Companies manufacturing communication protection devices. Therefore, equipment manufacturers could use this procedure to support their interoperability capabilities and, in this way, increase their sales.