Presentation | 2011-03-25 Security Model on Cryptographic Protocols for Mobile Devices Shin'ichiro MATSUO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Recently, information devices, with lower computational power than general personal computers such as smartphone, are generally used in our life. Because these devices have above limitation, it is not easy to perform cryptographic protocols which include public key cryptosystem efficiently. In this paper, we analyze limitations on computational power and security functionalities,then shows security models suitable of authenticated key exchange for mobile devices as an example. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Cryptographic Protocol / Security Model / Authenticated Key Exchange |
Paper # | ICSS2010-59 |
Date of Issue |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2011/3/18(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication System Security (ICSS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Security Model on Cryptographic Protocols for Mobile Devices |
Sub Title (in English) | |
Keyword(1) | Cryptographic Protocol |
Keyword(2) | Security Model |
Keyword(3) | Authenticated Key Exchange |
1st Author's Name | Shin'ichiro MATSUO |
1st Author's Affiliation | National Institute of Information and Communications Technology() |
Date | 2011-03-25 |
Paper # | ICSS2010-59 |
Volume (vol) | vol.110 |
Number (no) | 475 |
Page | pp.pp.- |
#Pages | 5 |
Date of Issue |