PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM
Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authenticati...
Main Authors: | S. Prasanna, M. Gobi |
---|---|
Format: | Article |
Language: | English |
Published: |
ICT Academy of Tamil Nadu
2014-03-01
|
Series: | ICTACT Journal on Communication Technology |
Subjects: | |
Online Access: | http://ictactjournals.in/paper/IJCT_Paper_8_904_to_906.pdf |
Similar Items
-
COMPARATIVE ANALYSIS OF HIGHER GENUS HYPERELLIPTIC CURVE CRYPTOSYSTEMS OVER FINITE FIELD FP
by: R. Ganesan, et al.
Published: (2011-03-01) -
Tutorial on Elliptic Curve Arithmetic and Introduction to Elliptic Curve Cryptography (ECC)
by: Bommireddipalli, Nithesh Venkata Ramana Surya
Published: (2017) -
Cloud-based Secure TeleMedicine Information System using Crypto-Biometric Techniques
by: Dindayal Mahto, et al.
Published: (2020-05-01) -
Development and Examination of In-browser GPU Accelerated Cryptography
by: Win, Dajne
Published: (2017) -
A dependable and secure approach for secret key establishment and operation in automotive CPS
by: Giri, Naresh Kumar
Published: (2018)