Show simple item record

dc.contributor.authorBest, Patricia K.
dc.contributor.authorNamuduri, Kameswara
dc.contributor.authorPendse, Ravi
dc.date.accessioned2011-09-20T14:46:08Z
dc.date.available2011-09-20T14:46:08Z
dc.date.issued2003-06-18
dc.identifier.citationBest, P.; Kamesh Namuduri; Pendse, R.; , "Quantitative analysis of security protocols in wireless networks," Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society , vol., no., pp. 290- 291, 18-20 June 2003 doi: 10.1109/SMCSIA.2003.1232436en_US
dc.identifier.isbn0780378083
dc.identifier.urihttp://hdl.handle.net/10057/3794
dc.identifier.urihttp://dx.doi.org/10.1109/SMCSIA.2003.1232436
dc.descriptionThe full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954en_US
dc.description.abstractSecurity has been a major concern for computer networks, and required levels of security continue to increase and become more complicated to provide. Wireless devices face new challenges in securely exchanging information due to their limitations such as power and bandwidth. Powerful algorithms have also been developed to provide authentication, confidentially, and integrity to information exchanged over computer networks. We evaluate security protocols, designed to overcome these limitations and quantitatively determine the performance differences between them. All the protocols were developed based on the assumption that a certificate authority (CA) exists and maintains the certificates of each device.en_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.ispartofseriesInformation Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society;vol., no., pp. 290- 291
dc.subjectComputer securityen_US
dc.subjectCryptographyen_US
dc.subjectData securityen_US
dc.subjectData integrityen_US
dc.subjectDigital signaturesen_US
dc.subjectIntelligent networksen_US
dc.subjectMessage authenticationen_US
dc.subjectPublic keyen_US
dc.subjectWireless application protocolen_US
dc.titleQuantitative analysis of security protocols in wireless networksen_US
dc.typeConference paperen_US
dc.description.versionPeer reviewed article
dc.rights.holder© IEEE, 2003


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record