An Asymmetric Authentication Protocol for Mobile Hand held Devices using ECC over Point Multiplication Method

Download Now
Provided by: International Journal of Advanced Research in Computer Science & Technology (IJARCST)
Topic: Security
Format: PDF
Mobile hand-held device is an efficient way to deliver real time data to users in the battle field military applications. The very nature of military applications necessitates the use of security features such as data confidentiality, authentication etc., which are not readily offered by mobile environment. The energy expenditure in such an environment also poses a supplementary performance bottleneck while achieving privacy. Hence, it is necessary to design and implement an energy efficient authentication protocol that accomplishes a high level of security with minimum energy consumption.
Download Now

Find By Topic