Sciweavers

402 search results - page 1 / 81
» Public key protocols for wireless communications
Sort
View
ICISC
1998
99views Cryptology» more  ICISC 1998»
13 years 6 months ago
Public key protocols for wireless communications
Abstract. Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that publi...
Colin Boyd, DongGook Park
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
13 years 10 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 2 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
MOBIHOC
2005
ACM
14 years 4 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
ISICT
2003
13 years 6 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey