Secure key establishment for low power devices using ECC
Wireless protocols are characterized by low computational power and memory. Hence security protocols dealing with these protocols have to be designed to give minimal computational and memory load on them. In addition to this issue, security is also a very important consideration since anyone can int...
Saved in:
Main Author: | Amol Dabholkar |
---|---|
Other Authors: | Yow Kin Choong |
Format: | Theses and Dissertations |
Published: |
2008
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/2445 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Similar Items
-
Security verification of network protocols
by: Chong, Yew Heng
Published: (2021) -
Security on the Internet
by: Kang, Siew Hwa.
Published: (2008) -
Development of healthcare applications using wireless wearable devices 1
by: Tan, Li Hau
Published: (2016) -
Investigation of security functions in 5G wireless networks
by: Yan, Ruoda
Published: (2021) -
Home security network
by: Wang, Lieyang.
Published: (2009)