PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM
Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authenticati...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
ICT Academy of Tamil Nadu
2014-03-01
|
Series: | ICTACT Journal on Communication Technology |
Subjects: | |
Online Access: | http://ictactjournals.in/paper/IJCT_Paper_8_904_to_906.pdf |