Novel methods for enabling public key schemes in future mobile systems
Komninos, N. & Honary, B. (2002). Novel methods for enabling public key schemes in future mobile systems. Paper presented at the 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.
Abstract
It is essential to enable public key schemes in future mobile systems to solve current problems in authentication and key management for end-to-end security. In this paper, we propose new procedures for enabling public key schemes in future mobile terminals. The proposed procedures are based on the complex public key computations that can be performed either in the SIM card or in the terminal itself. Multiple cryptoprocessors are also used to decrease the processing time required to perform the complex public key computations.
Publication Type: | Conference or Workshop Item (Paper) |
---|---|
Additional Information: | © 2002 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. |
Subjects: | Q Science > QA Mathematics > QA76 Computer software |
Departments: | School of Science & Technology > Computer Science > Software Reliability |