Presentation 2011-03-25
Security Model on Cryptographic Protocols for Mobile Devices
Shin'ichiro MATSUO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Recently, information devices, with lower computational power than general personal computers such as smartphone, are generally used in our life. Because these devices have above limitation, it is not easy to perform cryptographic protocols which include public key cryptosystem efficiently. In this paper, we analyze limitations on computational power and security functionalities,then shows security models suitable of authenticated key exchange for mobile devices as an example.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Cryptographic Protocol / Security Model / Authenticated Key Exchange
Paper # ICSS2010-59
Date of Issue

Conference Information
Committee ICSS
Conference Date 2011/3/18(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Security Model on Cryptographic Protocols for Mobile Devices
Sub Title (in English)
Keyword(1) Cryptographic Protocol
Keyword(2) Security Model
Keyword(3) Authenticated Key Exchange
1st Author's Name Shin'ichiro MATSUO
1st Author's Affiliation National Institute of Information and Communications Technology()
Date 2011-03-25
Paper # ICSS2010-59
Volume (vol) vol.110
Number (no) 475
Page pp.pp.-
#Pages 5
Date of Issue