Analysis of Key Exchange Protocols Using Session Keys

Download Now
Provided by: International Journal of Applied Information Systems (IJAIS)
Topic: Security
Format: PDF
As the technological advancements are made by mankind usage of various types of computer network is increasing. Security of information flowing through insecure network is becoming complicated with advent of internet and its usage. Encrypting information is one way of securing it from unauthorized access. This paper analyze techniques of exchanging key through which encryption is performed. The authors review the techniques on various parameters and find which technique is best suitable for use in mobile computers with limited processing power and battery capacity while efficiently working on wireless networks.
Download Now

Find By Topic