Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Novel methods for enabling public key schemes in future mobile systems
AU - Komninos, N.
AU - Honary, Bahram
PY - 2002/5
Y1 - 2002/5
N2 - It is essential to enable public key schemes in future mobile systems to solve current problems in authentication and key management for end-to-end security. We propose new procedures for enabling public key schemes in future mobile terminals. The proposed procedures are based on the complex public key computations that can be performed either in the SIM card or in the terminal itself Multiple cryptoprocessors are also used to decrease the processing time required to perform the complex public key computations.
AB - It is essential to enable public key schemes in future mobile systems to solve current problems in authentication and key management for end-to-end security. We propose new procedures for enabling public key schemes in future mobile terminals. The proposed procedures are based on the complex public key computations that can be performed either in the SIM card or in the terminal itself Multiple cryptoprocessors are also used to decrease the processing time required to perform the complex public key computations.
U2 - 10.1049/cp:20020438
DO - 10.1049/cp:20020438
M3 - Conference contribution/Paper
SN - 0-85296-749-7
SP - 455
EP - 458
BT - 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489)
PB - IEEE
CY - London, UK
ER -