The pollution attack in P2P live video streaming: measurement results and defenses
Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV
WAP PKI and certification path validation
International Journal of Internet Protocol Technology
Analysis and design of a hardware/software trusted platform module for embedded systems
ACM Transactions on Embedded Computing Systems (TECS)
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
On the implementation of security policies with adaptative encryption
Computer Communications
Authentication schemes for multimedia streams: Quantitative analysis and comparison
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Study of mobile payment protocols and its performance evaluation on mobile devices
International Journal of Information Technology and Management
A study of the performance of SSL on PDAs
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks
IEEE Transactions on Wireless Communications
Using adaptative encryption for ubiquitous environments
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Two robust remote user authentication protocols using smart cards
Journal of Systems and Software
Engineering SSL-based systems for enhancing system performance
Proceedings of the 2nd ACM/SPEC International Conference on Performance engineering
Secure electronic payments in heterogeneous networking: new authentication protocols approach
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
International Journal of Network Management
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
An empirical energy model for secure Web browsing over mobile devices
Security and Communication Networks
Reducing the computational cost of certification path validation in mobile payment
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |
The past few years have witnessed an explosive growth in the use of wireless mobile handheld devices as the enabling technology for accessing Internet-based services, as well as for personal communication needs in ad hoc networking environments. Most studies indicate that it is impossible to utilize strong cryptographic functions for implementing security protocols on handheld devices. Our work refutes this. Specifically, we present a performance analysis focused on three of the most commonly used security protocols for networking applications, namely SSL, S/MIME and IPsec. Our results show that the time taken to perform cryptographic functions is small enough not to significantly impact real-time mobile transactions and that there is no obstacle to the use of quite sophisticated cryptographic protocols on handheld mobile devices.