City Research Online

Authentication and key distribution for wired and wireless systems

Komninos, N., Samarakoon, M. I. & Honary, B. (2000). Authentication and key distribution for wired and wireless systems. Paper presented at the 1st Annual Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 19 - 20 June 2000, Liverpool John Moores University, Liverpool, UK.

Abstract

With the emergence of E-Commerce communication security has become a very important issue. Two main considerations of secure communication systems are authentication, and key distribution. Authentication and key distribution may differ from one system to another due to the system parameters such as bandwidth, and available processing power at the end terminals. This paper focuses on end-to-end authentication and key management strategies in wireless and wired systems. Public and secret key encryption techniques are used to provide authentication and key distribution.

Publication Type: Conference or Workshop Item (Paper)
Subjects: Q Science > QA Mathematics > QA76 Computer software
Departments: School of Science & Technology > Computer Science > Software Reliability
[thumbnail of Authentication and Key Distribution Protocols for Wired and.pdf]
Preview
PDF
Download (60kB) | Preview

Export

Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Downloads

Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login