Secure key establishment for low power devices using ECC
Date of Issue2005
School of Computer Engineering
Wireless protocols are characterized by low computational power and memory. Hence security protocols dealing with these protocols have to be designed to give minimal computational and memory load on them. In addition to this issue, security is also a very important consideration since anyone can intercept wireless communication with the right equipment. Hence wireless applications need more security.
DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks
Nanyang Technological University