Authentication and key distribution for wired and wireless systems

Komninos, N., Samarakoon, M. I. & Honary, B. (2000). Authentication and key distribution for wired and wireless systems. Paper presented at the 1st Annual Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 19 - 20 June 2000, Liverpool John Moores University, Liverpool, UK.

Download (60kB) | Preview


With the emergence of E-Commerce communication security has become a very important issue. Two main considerations of secure communication systems are authentication, and key distribution. Authentication and key distribution may differ from one system to another due to the system parameters such as bandwidth, and available processing power at the end terminals. This paper focuses on end-to-end authentication and key management strategies in wireless and wired systems. Public and secret key encryption techniques are used to provide authentication and key distribution.

Item Type: Conference or Workshop Item (Paper)
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: School of Informatics > Informatics and Interdisciplinary Centre for Information Leadership
School of Informatics > Centre for Software Reliability

Actions (login required)

View Item View Item


Downloads per month over past year

View more statistics