Hybrid cryptography key management.
Author(s) -
Timothy J. Draelos,
Mark Torgerson,
William L. Neumann,
D.R. Gallup,
Michael D. Collins,
Cheryl Beaver
Publication year - 2003
Language(s) - English
Resource type - Reports
DOI - 10.2172/918318
Subject(s) - computer science , cryptography , key management , computer network , wireless , key (lock) , cryptographic protocol , wireless network , bandwidth (computing) , public key cryptography , computer security , encryption , telecommunications
Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom