City Research Online

Novel methods for enabling public key schemes in future mobile systems

Komninos, N. & Honary, B. (2002). Novel methods for enabling public key schemes in future mobile systems. Paper presented at the 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.

Abstract

It is essential to enable public key schemes in future mobile systems to solve current problems in authentication and key management for end-to-end security. In this paper, we propose new procedures for enabling public key schemes in future mobile terminals. The proposed procedures are based on the complex public key computations that can be performed either in the SIM card or in the terminal itself. Multiple cryptoprocessors are also used to decrease the processing time required to perform the complex public key computations.

Publication Type: Conference or Workshop Item (Paper)
Additional Information: © 2002 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.
Subjects: Q Science > QA Mathematics > QA76 Computer software
Departments: School of Science & Technology > Computer Science > Software Reliability
[thumbnail of NOVEL METHODS FOR ENABLING PUBLIC KEY SCHEMES IN FUTURE MOBILE SYSTEMS.pdf]
Preview
PDF
Download (122kB) | Preview

Export

Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Downloads

Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login