PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM

Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authenticati...

Full description

Bibliographic Details
Main Authors: S. Prasanna, M. Gobi
Format: Article
Language:English
Published: ICT Academy of Tamil Nadu 2014-03-01
Series:ICTACT Journal on Communication Technology
Subjects:
RSA
ECC
Online Access:http://ictactjournals.in/paper/IJCT_Paper_8_904_to_906.pdf