Data and computer communications (5th ed.)
Data and computer communications (5th ed.)
Component software: beyond object-oriented programming
Component software: beyond object-oriented programming
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
Mobile Commerce: A New Frontier
Computer
Distributed Object Models, Mobile Computing And Electronic Commerce
ICPPW '98 Proceedings of the 1998 International Conference on Parallel Processing Workshops
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
GPRS and 3G Wireless Applications: Professional Developer's Guide
GPRS and 3G Wireless Applications: Professional Developer's Guide
Hi-index | 0.00 |
The development of Java based wireless applications presents challenges such as securing communication and authentication between mobile devices and a server. It is acknowledged that cryptography is commonly used to secure network communications and provide authentication functionality. However, due to the nature of mobile devices such as cellular phones and personal digital assistants, the application of cryptography on a software level in Java wireless applications can slow down the execution time if not implemented properly since these devices are limited in terms of memory size, processing power, storage capacity and input/output facilities. Aside from performance aspects, inappropriate application of cryptography could weaken the security of a system, even worse the developer is not aware of it until the system is attacked. This paper presents a prototype framework that can be used to effectively and efficiently utilize cryptographic algorithms and protocols on Java enabled mobile devices.