How about this?

Title: Security protocols in constrained environments

Abstract: implementation of security protocols such as TLS, SSH or IPsec come with a memory and compute overhead. Whilst this has become negligible in full scale environments it's still a real issue for hobbyist and embedded developers. This presentation will look at the sources of the overheads, what can be done to minimise them, and what sort of hardware platforms can be made to absorb them. The benefits and potential pitfalls of hardware specific implementations will also be examined.

Bio: Chris Swan is CTO at CohesiveFT where he helps build secure cloud based networks. He's previously been a security guy at large Swiss banks, and before that was a Weapon Engineering Officer in the Royal Navy. Chris has tinkered with electronics since pre school, and these days has a desk littered with various dev boards and projects.


--
Chris


On 5 January 2014 10:57, Andrew Back <arback@computer.org> wrote:
On 5 January 2014 09:10, Chris Swan <chris.swan@iee.org> wrote:
> If you're still looking for a third speaker then I could maybe work
> something up on the challenges of doing security protocols like
> TLS/SSH/IPsec in resource constrained environments.

Sounds good! I can see this could be a particular concern with sensor
networks, where lack of appropriate security could give away a lot
about you, e.g. movements, what you're doing and so on.

Do you think you might be able to send across a talk, brief abstract
and current bio in the next couple of days or so?

Best,

Andrew

_______________________________________________
oshug mailing list
oshug@oshug.org
http://oshug.org/cgi-bin/mailman/listinfo/oshug