Fundamentals of computer security technology
Fundamentals of computer security technology
Resynchronization weaknesses in synchronous stream ciphers
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Wireless Security: Models, Threats, and Solutions
Wireless Security: Models, Threats, and Solutions
Security in Wireless Communication
Wireless Personal Communications: An International Journal
Mobile Networks and Applications - Security in mobile computing environments
On the Security of an Enhanced Authentication Key Exchange Protocol
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Hi-index | 0.00 |
There are important performance issues in secure wireless networks, such as power, bandwidth, and bit error rate (BER), that must be considered when designing a communication resume protocol. The efficiency of a secure communication resume for a fast resume of secure communication is a key point in secure connection development. In this paper, a fast secure communication resume protocol for a wireless network is presented and evaluated against the efficiency of conventional resume protocols. Our proposed resume protocol is found to achieve better performance, in terms of transmission traffic, consumed time, and BER, than conventional resume protocols.