• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 12,144
Next 10 →

Table 1 attempts to compare the main features of interest in the di erent pro- tocols we have examined in the paper. Those protocols that use public key cryptography are classi ed as using either light or heavy algorithms to indicate the computational complexity required by the mobile agents. It should be em- phasised that this gives only a rough indication since speci c algorithms can di er markedly in their required computation. However, in most cases we can di erentiate between those protocols which have been designed with the lim- ited computational ability of a mobile in mind, and which use light public key cryptography, and those which have not, and use heavy public key cryptography.

in Key establishment protocols for secure mobile communications: A selective survey
by Colin Boyd, Anish Mathuria 1998
"... In PAGE 11: ... Table1 . Comparison of Major Features of Di erent Protocols References 1.... ..."
Cited by 26

Table 2 shows the result of performing snmpget requests on the scalar sysDescr using different transports. There is a significant cost associated with the estab- lishment of SSH sessions. This is, however, not surprising since the SSH protocol establishes a session key using a Diffie-Hellman key exchange (using public-key cryptography) before the user authentication protocol is executed and the SSH channel is established. Since the cryptographic operations are CPU bound, the session establishment times increases significantly on our slow test machine.

in Performance Analysis of SNMP over SSH
by Vladislav Marinov, Jürgen Schönwälder 2001
"... In PAGE 7: ... Table2 . Performance of snmpget requests (sysDescr.... In PAGE 7: ... Performance of snmpget requests (sysDescr.0) Table2 also shows that there is an clear difference in the amount of data (total size of the Ethernet frames) and the number of IP packets exchanged between UDP and TCP transports. While this overhead is usually not a big issue on a well functioning local area network, it might be an issue in networks... ..."
Cited by 1

Table I. A local challenge (LC) is a random number for authentication procedures. An MR or VMN encrypts the LC using a pre-defined SA with its AAAH server. The encrypted value is called a credential (CR), which is used to authenticate an MR which creates it. MRs and VMNs are identified by their NAIs and a replay protection indicator (RPI) is used to protect from a replay attack. Either a time stamp or a random number can be used as an RPI. The size of the KAAA field is 128 bytes by assuming a public key cryptography algorithm. As we adopt a symmetric key cryptography for dynamic keys (KLOCAL and KHOME, the size of each key is 32 bytes. Note that a dynamic key is used to establish a dynamic SA while a long-term key is to establish a long-term SA. Other notations will be elaborated later.

in A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots
by Sungmin Baek, Sangheon Pack, Taekyoung Kwon, Yanghee Choi

Table 3: Cryptographic operations in an SSL Handshake.

in Speeding up secure web transactions using elliptic curve cryptography
by Vipul Gupta, Douglas Stebila, Stephen Fung, Sheueling Chang, Nils Gura, Hans Eberle 2004
"... In PAGE 7: ... 3.4 Public-Key Cryptography in SSL Table3 summarizes the various public-key cryptographic operations performed by a client and server in different modes of the SSL handshake. 1.... ..."
Cited by 11

Table 1: Our mechanisms compared with public key equivalents

in Efficient Security Mechanisms for Routing Protocols
by Yih-chun Hu, Adrian Perrig, David B. Johnson 2003
"... In PAGE 12: ... To compare these results to the efficiency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44

Table 1: Our mechanisms compared with public key equivalents

in Efficient Security Mechanisms for Routing Protocols
by Yih-chun Hu 2003
"... In PAGE 12: ... To compare these results to the ef ciency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44

Table 1: Our mechanisms compared with public key equivalents

in Efficient Security Mechanisms for Routing Protocols
by Yih-chun Hu 2003
"... In PAGE 12: ... To compare these results to the ef ciency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44

Table 1: Our mechanisms compared with public key equivalents

in Efficient security mechanisms for routing protocols
by Yih-chun Hu 2003
"... In PAGE 12: ... To compare these results to the efficiency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44

Table 9: Key Material Exchange Protocols Proposed by ATM Forum

in Shortened digital signature, signcryption and compact and unforgeable Key agreement schemes
by Yuliang Zheng 1998
"... In PAGE 35: ... {X} indicates that X is optional. With the aid of the above symbols, we summarize in Table9 the two protocols proposed in Phase I ATM Security Specification. It is stated in Phase I ATM Security Specification that the two key material exchange protocols can be implemented either in secret key (symmetric) cryptography or public key (asymmetric) cryptography.... ..."

Table 9: Key Material Exchange Protocols Proposed by ATM Forum

in unknown title
by unknown authors
"... In PAGE 35: ... fXg indicates that X is optional. With the aid of the above symbols, we summarize in Table9 the two protocols proposed in Phase I ATM Security Speci cation. It is stated in Phase I ATM Security Speci cation that the two key material exchange protocols can be implemented either in secret key (symmetric) cryptography or public key (asymmetric) cryptography.... ..."
Next 10 →
Results 1 - 10 of 12,144
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University