Show simple item record

dc.contributor.authorLimmer, Tobiasen_US
dc.contributor.authorGonzalez, Rubenen_US
dc.contributor.authorDressler, Falkoen_US
dc.contributor.editorPeter Holleczeken_US
dc.date.accessioned2017-04-24T10:36:16Z
dc.date.available2017-04-24T10:36:16Z
dc.date.issued2006en_US
dc.date.modified2010-07-29T08:16:42Z
dc.identifier.urihttp://hdl.handle.net/10072/32833
dc.description.abstractIn this paper, we evaluated the performance of key exchange protocols on mobile devices. The wide usage of low power mobile phones causes mobile computing to spread rapidly and an increasing number of networked applications are developed for these devices. One important consideration in this scenario is data security. This is particularly important in secure groupware, collaborative or multiuser applications where simultaneous communication with multiple parties must be securely maintained. One key component of building secure data channels are computationally expensive key exchange protocols. Based on the benchmark of several asymmetric algorithms on mobile phones, we theoretically analyzed the speed of authenticated multiparty key agreement protocols with different designs and compared them with each other. The results were confirmed by a protocol benchmark in our testbed.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_AU
dc.languageEnglishen_US
dc.language.isoen_AU
dc.publisherSpringeren_US
dc.publisher.placeNetherlandsen_US
dc.relation.ispartofstudentpublicationYen_AU
dc.relation.ispartofconferencenameEchtzeit im Alltag: Fachtagung der GI-Fachgruppe Echtzeitsysteme (PEARL 2006)en_US
dc.relation.ispartofconferencetitleProceedings of Echtzeit im Alltag: Fachtagung der GI-Fachgruppe Echtzeitsysteme (PEARL 2006),en_US
dc.relation.ispartofdatefrom2006-11-22en_US
dc.relation.ispartofdateto2006-11-25en_US
dc.relation.ispartoflocationBoppard, Germany,en_US
dc.rights.retentionYen_AU
dc.subject.fieldofresearchAnalysis of Algorithms and Complexityen_US
dc.subject.fieldofresearchInformation and Computing Sciences not elsewhere classifieden_US
dc.subject.fieldofresearchcode080201en_US
dc.subject.fieldofresearchcode089999en_US
dc.titleEvaluation of real-time aspects of multiparty security on low-power mobile devicesen_US
dc.typeConference outputen_US
dc.type.descriptionE1 - Conference Publications (HERDC)en_US
dc.type.codeE - Conference Publicationsen_US
gro.date.issued2006
gro.hasfulltextNo Full Text


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record