Now showing items 1-2 of 2
Lightweight cryptography and authentication protocols for secure communications between resource-limited devices and wireless sensor networks: evaluation and implementation
This dissertation examines the theoretical context for the security of wireless communication between ubiquitous computing devices and presents an implementation that addresses this need. The number of Resource-Limited ...
Evaluating elliptic curve cryptography for use on java card
Smart cards are used as trusted storage and data processing systems to store cryptographic private keys and other valuable information. Java Card promises the ease of programming in Java to the world of smart cards. ...