City Research Online

Authentication and key distribution for wired and wireless systems

Komninos, N., Samarakoon, M. I. & Honary, B. (2000). Authentication and key distribution for wired and wireless systems. Paper presented at the 1st Annual Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 19 - 20 June 2000, Liverpool John Moores University, Liverpool, UK.


With the emergence of E-Commerce communication security has become a very important issue. Two main considerations of secure communication systems are authentication, and key distribution. Authentication and key distribution may differ from one system to another due to the system parameters such as bandwidth, and available processing power at the end terminals. This paper focuses on end-to-end authentication and key management strategies in wireless and wired systems. Public and secret key encryption techniques are used to provide authentication and key distribution.

Publication Type: Conference or Workshop Item (Paper)
Subjects: Q Science > QA Mathematics > QA76 Computer software
Departments: School of Science & Technology > Computer Science > Software Reliability
Download (60kB) | Preview



Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login