Java Implementation of an Authentication Protocol with Application on Mobile Phones

Download Now
Provided by: Institute of Electrical & Electronic Engineers
Topic: Security
Format: PDF
Mobile phones are ubiquitous devices that begin to be involved in plenty of tasks in addition to their standard voice function. Using mobile phones to access remote information over TCP/IP is a common demand. However, when travel across networks, information is exposed to several security risks, and the use of cryptographic security unavoidable. Mobile phones still have low computational power and implementing cryptography is not easy as it requires more computational resources. In this paper, the authors deal with the implementation of a broadcast authentication protocol based on quadratic residues chains, constructed with the squaring function, and time synchronization.
Download Now

Find By Topic