Novel methods for enabling public key schemes in future mobile systems

Komninos, N. and Honary, Bahram (2002) Novel methods for enabling public key schemes in future mobile systems. In: 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). IEEE, London, UK, 455–458. ISBN 0-85296-749-7

Full text not available from this repository.

Abstract

It is essential to enable public key schemes in future mobile systems to solve current problems in authentication and key management for end-to-end security. We propose new procedures for enabling public key schemes in future mobile terminals. The proposed procedures are based on the complex public key computations that can be performed either in the SIM card or in the terminal itself Multiple cryptoprocessors are also used to decrease the processing time required to perform the complex public key computations.

Item Type:
Contribution in Book/Report/Proceedings
ID Code:
61101
Deposited By:
Deposited On:
12 Feb 2013 13:18
Refereed?:
Yes
Published?:
Published
Last Modified:
18 Sep 2023 02:31