Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices

Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launchin...

متن کامل

Energy cost analysis of IPSec on handheld devices

We analyze the computation overhead of the IP security protocol (IPSec) on a handheld device. We design experiments to quantify the energy consumed by the individual components in IPSec. We then experiment with several measures which can potentially cut the energy consumption without compromising security. Our results show that by replacing 3DES with Advanced Encryption Standard as the encrypti...

متن کامل

Energy Consumption for Cryptographic Algorithms with Different Clocks on Smart Cards in Mobile Devices

In mobile devices, smart cards become the trend and are used in numerous applications and services. Since mobile devices are battery-powered, so it is important to find energy saving solutions to reduce energy consumption. Most mobile devices are powered by batteries with limited power capacity. In order to protect information during the communication process, security system designers use many...

متن کامل

Signature Verification on Handheld Devices

Signature verification for handheld devices (e.g. smartphones, PDAs, etc.) as an authentication method is studied. Signature can be used to authenticate users in mobile networks for secure transactions. The challenges of signature verification on mobile devices are addressed and analyzed and the architecture for a verification platform is outlined. We propose a verification system adapted to ha...

متن کامل

Authenticating Users on Handheld Devices

Adequate user authentication is a persistent problem, particularly with handheld devices, which tend to be highly personal and at the fringes of an organization’s influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk, not only by the sensitive information they may contain, but also the means to access such information they may provide. U...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Future Internet

سال: 2011

ISSN: 1999-5903

DOI: 10.3390/fi3010031