Handbook of Applied Cryptography
Handbook of Applied Cryptography
Elliptic Curve Based Password Authenticated Key Exchange Protocols
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Securing Your Data in Agent-Based P2P Systems
DASFAA '03 Proceedings of the Eighth International Conference on Database Systems for Advanced Applications
Scalable Home Network Interaction Model Based on Mobile Agents
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
An end-to-end home network security framework
Computer Communications
Hi-index | 0.00 |
Home network environments provide telemetering services through AMR (Automatic Meter Reading) systems. For households' convienience, the AMR system automatically inspects gas, water, and electricity meters at the remote site. Since this telemetering information is associated with billing, it must be secure. So, it is necessary to design a security protocol for AMR systems. In this paper, we adapt discrete logarithm based multi-signcryption to an elliptic curve based multi-signcryption protocol, for the purpose of efficiency. And, we propose a secure mobile agent protocol for AMR systems using the elliptic curve based multi-signcryption. Our protocol efficiently provides user authentication, integrity and confidentiality of telemetering information.