A Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices.
Phongsak PrasithsangareePrashant KrishnamurthyPublished in: HSNMC (2004)
Keyphrases
- authentication protocol
- wireless devices
- smart card
- processing power
- distributed environment
- mobile phone
- mobile applications
- lightweight
- wifi
- security analysis
- public key
- security protocols
- rfid tags
- mobile devices
- secret key
- computing environments
- real time
- wireless channels
- wireless technologies
- hash functions
- computing power
- limited resources
- end to end
- video sequences
- high bandwidth
- information systems