Secure key establishment for low power devices using ECC
Wireless protocols are characterized by low computational power and memory. Hence security protocols dealing with these protocols have to be designed to give minimal computational and memory load on them. In addition to this issue, security is also a very important consideration since anyone can int...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Published: |
2008
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/2445 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Be the first to leave a comment!