Secure key establishment for low power devices using ECC
Wireless protocols are characterized by low computational power and memory. Hence security protocols dealing with these protocols have to be designed to give minimal computational and memory load on them. In addition to this issue, security is also a very important consideration since anyone can int...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Published: |
2008
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/2445 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Summary: | Wireless protocols are characterized by low computational power and memory. Hence security protocols dealing with these protocols have to be designed to give minimal computational and memory load on them. In addition to this issue, security is also a very important consideration since anyone can intercept wireless communication with the right equipment. Hence wireless applications need more security. |
---|