Elliptic Curve Cryptography in Securing Networks by Mobile Authentication

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elliptic Curve Cryptography in Securing Networks by Mobile Authentication

This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols [2] and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attac...

متن کامل

Elliptic Curve Cryptography for Securing Payment System

Mobile payment system has made it easy for people to do financial transaction. However, its security is still a concern. It needs to protect the data transferred between parties involved in the system. In this paper, we investigate the possibility use of elliptic curve cryptography to secure the data transferred in a payment system.

متن کامل

Elliptic Curve Cryptography Based Wireless Authentication Protocol

Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower computational burden, lower communication bandwidth and storage requirements. However, Mangipudi et al showed that the protocol is vulnerable to the man-inthe-middle attack from the attacker within the system and proposed a...

متن کامل

Elliptic Curve Cryptography Coprocessor for Mobile Ad-Hoc Networks

This paper investigates the design of an Elliptic Curve Cryptography (ECC) co-processor in an embedded system. The goal of this work is to create a general purpose module to greatly augment a network node’s performance, thereby making it practical to implement secure ECC-based network protocols in potentially vulnerable ad-hoc networks. Specifically, the techniques presented here employ hybrid ...

متن کامل

Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture

Communication security is one of the areas where research is highly required. The data used in communication is very sensitive and needs to be protected and made abstract from intruders of system. This research is all about securing the messages or data that is being communicated among two parties.The recent branch of Network security is Cryptography using Elliptic Curve Architectures which is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Cryptography and Information Security

سال: 2013

ISSN: 1839-8626

DOI: 10.5121/ijcis.2013.3304