IEEE INFOCOM Workshops 2009 2009
DOI: 10.1109/infcomw.2009.5072104
|View full text |Cite
|
Sign up to set email alerts
|

A Study of the Performance of SSL on PDAs

Abstract: Abstract-PDAs and smartphones are increasingly being used as handheld computers. Today, their network connectivity and their usages for various tasks over the Internet require privacy and authenticity. In this paper, we conduct a comprehensive and comparative study of the performance of the SSL protocol for PDA and laptop clients, both in WEP secured and open Wi-Fi environments. Unlike previous studies [1], [2], the measurements are at sub-protocol granularity allowing for researchers to consider appropriate o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
8
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 11 publications
1
8
0
Order By: Relevance
“…This step factors the time it takes for the client to perform the necessary computations. These results also agree with those reported in [2]. Google and Facebook did not support the Diffie-Hellman protocol.…”
Section: B Stepwise Analysissupporting
confidence: 91%
“…This step factors the time it takes for the client to perform the necessary computations. These results also agree with those reported in [2]. Google and Facebook did not support the Diffie-Hellman protocol.…”
Section: B Stepwise Analysissupporting
confidence: 91%
“…Similarly, Zhao et al investigate the most time consuming operations of commonly used cryptographic algorithms in TLS [16]. Analyzing the performance of SSL connections for mobile devices is done by [3] and [13]. Unlike our work, this focuses on the cost of connections for mobile clients, not servers which communicate with mobile clients.…”
Section: Transaction Per Second Resultsmentioning
confidence: 99%
“…(ii) Temporal validity may be verified by simply comparing D-expire to the current date. All these operations are typically executed in a few seconds (in particular, the cryptographic steps involved in the digital signature verification and HTTPS interaction with a centralized server may be expected to take much less than one second based on the data in [19,20]). These operations can be easily integrated with the usual store and register working.…”
Section: Qr Code and Appmentioning
confidence: 99%