Home > Research > Publications & Outputs > Novel methods for enabling public key schemes i...
View graph of relations

Novel methods for enabling public key schemes in future mobile systems

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Novel methods for enabling public key schemes in future mobile systems. / Komninos, N.; Honary, Bahram.
3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, 2002. p. 455–458.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Komninos, N & Honary, B 2002, Novel methods for enabling public key schemes in future mobile systems. in 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). IEEE, London, UK, pp. 455–458. https://doi.org/10.1049/cp:20020438

APA

Komninos, N., & Honary, B. (2002). Novel methods for enabling public key schemes in future mobile systems. In 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489) (pp. 455–458). IEEE. https://doi.org/10.1049/cp:20020438

Vancouver

Komninos N, Honary B. Novel methods for enabling public key schemes in future mobile systems. In 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE. 2002. p. 455–458 doi: 10.1049/cp:20020438

Author

Komninos, N. ; Honary, Bahram. / Novel methods for enabling public key schemes in future mobile systems. 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK : IEEE, 2002. pp. 455–458

Bibtex

@inproceedings{2fdc1815f2304f31a13b37e41cfaad1b,
title = "Novel methods for enabling public key schemes in future mobile systems",
abstract = "It is essential to enable public key schemes in future mobile systems to solve current problems in authentication and key management for end-to-end security. We propose new procedures for enabling public key schemes in future mobile terminals. The proposed procedures are based on the complex public key computations that can be performed either in the SIM card or in the terminal itself Multiple cryptoprocessors are also used to decrease the processing time required to perform the complex public key computations.",
author = "N. Komninos and Bahram Honary",
year = "2002",
month = may,
doi = "10.1049/cp:20020438",
language = "English",
isbn = "0-85296-749-7",
pages = "455–458",
booktitle = "3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Novel methods for enabling public key schemes in future mobile systems

AU - Komninos, N.

AU - Honary, Bahram

PY - 2002/5

Y1 - 2002/5

N2 - It is essential to enable public key schemes in future mobile systems to solve current problems in authentication and key management for end-to-end security. We propose new procedures for enabling public key schemes in future mobile terminals. The proposed procedures are based on the complex public key computations that can be performed either in the SIM card or in the terminal itself Multiple cryptoprocessors are also used to decrease the processing time required to perform the complex public key computations.

AB - It is essential to enable public key schemes in future mobile systems to solve current problems in authentication and key management for end-to-end security. We propose new procedures for enabling public key schemes in future mobile terminals. The proposed procedures are based on the complex public key computations that can be performed either in the SIM card or in the terminal itself Multiple cryptoprocessors are also used to decrease the processing time required to perform the complex public key computations.

U2 - 10.1049/cp:20020438

DO - 10.1049/cp:20020438

M3 - Conference contribution/Paper

SN - 0-85296-749-7

SP - 455

EP - 458

BT - 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489)

PB - IEEE

CY - London, UK

ER -