Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments

Author(s):  
Murat Fiskiran ◽  
Lee
2013 ◽  
Vol 2 (2) ◽  
Author(s):  
Victor O. Waziri ◽  
Ojeniyi J. Adebayo ◽  
Hakimi Danladi ◽  
Audu Isah ◽  
Abubakar S. Magaji ◽  
...  

2012 ◽  
Vol 203 ◽  
pp. 207-211
Author(s):  
Li Ye ◽  
Feng Liu

Industrial wireless control network brought great convenience in industrial production, and security issues was very important. This paper analyzing the characteristics of the wireless industry control network, and presented a perspective which based on elliptic curve cryptography system, at last, introduction to design a hierarchic structure of the ECC integral solution, then make it better applied to the industrial wireless environment.


Author(s):  
Kazuki NAGANUMA ◽  
Takashi SUZUKI ◽  
Hiroyuki TSUJI ◽  
Tomoaki KIMURA

Author(s):  
Mohd Javed ◽  
Khaleel Ahmad ◽  
Ahmad Talha Siddiqui

WiMAX is the innovation and upgradation of 802.16 benchmarks given by IEEE. It has numerous remarkable qualities, for example, high information rate, the nature of the service, versatility, security and portability putting it heads and shoulder over the current advancements like broadband link, DSL and remote systems. Though like its competitors the concern for security remains mandatory. Since the remote medium is accessible to call, the assailants can undoubtedly get into the system, making the powerless against the client. Many modern confirmations and encryption methods have been installed into WiMAX; however, regardless it opens with up different dangers. In this paper, we proposed Elliptic curve Cryptography based on Cellular Automata (EC3A) for encryption and decryption the message for improving the WiMAX security


Sign in / Sign up

Export Citation Format

Share Document