Home > Research > Publications & Outputs > Novel authentication and key agreement protocol...
View graph of relations

Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems. / Samarakoon, M.I.; Honary, Bahram.
Novel DSP Algorithms and Architectures for Radio Systems, IEE Colloquium on. London: IEEE, 1999. p. 9/1-9/5.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Samarakoon, MI & Honary, B 1999, Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems. in Novel DSP Algorithms and Architectures for Radio Systems, IEE Colloquium on. IEEE, London, pp. 9/1-9/5. https://doi.org/10.1049/ic:19990851

APA

Samarakoon, M. I., & Honary, B. (1999). Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems. In Novel DSP Algorithms and Architectures for Radio Systems, IEE Colloquium on (pp. 9/1-9/5). IEEE. https://doi.org/10.1049/ic:19990851

Vancouver

Samarakoon MI, Honary B. Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems. In Novel DSP Algorithms and Architectures for Radio Systems, IEE Colloquium on. London: IEEE. 1999. p. 9/1-9/5 doi: 10.1049/ic:19990851

Author

Samarakoon, M.I. ; Honary, Bahram. / Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems. Novel DSP Algorithms and Architectures for Radio Systems, IEE Colloquium on. London : IEEE, 1999. pp. 9/1-9/5

Bibtex

@inproceedings{7c874177f177469689efc6bf1dc501a7,
title = "Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems",
abstract = "Digital portable communications systems (PCS) use cryptographic security techniques to provide privacy to traffic and to prevent fraudulent use of the system resources. Both secret-key and public-key cryptographic protocols are available to provide security to PCS. We present a new protocol, which combines secret-key and public-key techniques. This hybrid protocol has the advantages over the other conventional protocols of not having to maintain a database of secret keys in the PCS networks, and not having to perform the complex and time consuming calculations at the time of authentication in the portables.",
author = "M.I. Samarakoon and Bahram Honary",
year = "1999",
month = sep,
doi = "10.1049/ic:19990851",
language = "English",
pages = "9/1--9/5",
booktitle = "Novel DSP Algorithms and Architectures for Radio Systems, IEE Colloquium on",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems

AU - Samarakoon, M.I.

AU - Honary, Bahram

PY - 1999/9

Y1 - 1999/9

N2 - Digital portable communications systems (PCS) use cryptographic security techniques to provide privacy to traffic and to prevent fraudulent use of the system resources. Both secret-key and public-key cryptographic protocols are available to provide security to PCS. We present a new protocol, which combines secret-key and public-key techniques. This hybrid protocol has the advantages over the other conventional protocols of not having to maintain a database of secret keys in the PCS networks, and not having to perform the complex and time consuming calculations at the time of authentication in the portables.

AB - Digital portable communications systems (PCS) use cryptographic security techniques to provide privacy to traffic and to prevent fraudulent use of the system resources. Both secret-key and public-key cryptographic protocols are available to provide security to PCS. We present a new protocol, which combines secret-key and public-key techniques. This hybrid protocol has the advantages over the other conventional protocols of not having to maintain a database of secret keys in the PCS networks, and not having to perform the complex and time consuming calculations at the time of authentication in the portables.

U2 - 10.1049/ic:19990851

DO - 10.1049/ic:19990851

M3 - Conference contribution/Paper

SP - 9/1-9/5

BT - Novel DSP Algorithms and Architectures for Radio Systems, IEE Colloquium on

PB - IEEE

CY - London

ER -