Novel methods for enabling public key schemes in future mobile systems

Komninos, N. & Honary, B. (2002). Novel methods for enabling public key schemes in future mobile systems. Paper presented at the 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.

[img]
Preview
PDF
Download (122kB) | Preview

Abstract

It is essential to enable public key schemes in future mobile systems to solve current problems in authentication and key management for end-to-end security. In this paper, we propose new procedures for enabling public key schemes in future mobile terminals. The proposed procedures are based on the complex public key computations that can be performed either in the SIM card or in the terminal itself. Multiple cryptoprocessors are also used to decrease the processing time required to perform the complex public key computations.

Item Type: Conference or Workshop Item (Paper)
Additional Information: © 2002 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: School of Informatics > Informatics and Interdisciplinary Centre for Information Leadership
School of Informatics > Centre for Software Reliability
URI: http://openaccess.city.ac.uk/id/eprint/2495

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics