Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings.
DOI: 10.1109/nca.2004.1347774
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of cryptographic protocols on handheld devices

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(29 citation statements)
references
References 6 publications
0
28
0
Order By: Relevance
“…It is important to understand how this combination of security protocols affects, if at all, the performance of SSL over wireless networks. Works in [1], [6] examined the performance of SSL over an open Wi-Fi connection, but did not explore the effect of WEP.…”
Section: E) Wep and Sslmentioning
confidence: 99%
See 2 more Smart Citations
“…It is important to understand how this combination of security protocols affects, if at all, the performance of SSL over wireless networks. Works in [1], [6] examined the performance of SSL over an open Wi-Fi connection, but did not explore the effect of WEP.…”
Section: E) Wep and Sslmentioning
confidence: 99%
“…It provides security at the transport layer. While the performance impact of these protocols, especially SSL, is well studied for commodity client machines, only recently [1], [2], [6] has the community begun studying the performance of these protocols for small handheld devices such as PDAs and smartphones which have constrained computational, energy and software resources.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To solve this problem while improving enterprise private cloud Encrypting File System certified strength, an efficient tripartite key agreement protocol without certificate authentication enterprise private cloud be applied to encrypt the file system [5], so we can overcome key Hosted problem. The real mutual authentication between EES and, after analysis of the program compared to the traditional scheme has a good performance.…”
Section: Tripartite Secret Key Agreement Based Enterprise Private Clomentioning
confidence: 99%
“…That is estimated for a typical limited-capability device, by using a small fraction (5-10%) of its CPU time. It is experimented in [20] that 1024-bit RSA verification when the public exponent is 65537 takes about 5 milliseconds on an iPAQ H3630 with a 206 MHz StrongARM processor, 32 MB of RAM, and running Windows CE Pocket PC 2002. A similar experiment [21] measures 1024-bit RSA verification time on a number of J2ME-enabled mobile devices and reports that the time taken ranges from a few to more than a hundred milliseconds.…”
Section: Numerical Analysismentioning
confidence: 99%