z-logo
open-access-imgOpen Access
Hybrid cryptography key management.
Author(s) -
Timothy J. Draelos,
Mark Dolan Torgerson,
William Douglas Neumann,
Donald R. Gallup,
Michael J. Collins,
Cheryl Beaver
Publication year - 2003
Language(s) - English
Resource type - Reports
DOI - 10.2172/918318
Subject(s) - computer science , cryptography , key management , computer network , wireless , key (lock) , cryptographic protocol , wireless network , bandwidth (computing) , public key cryptography , computer security , encryption , telecommunications
Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here