Search
Now showing items 1-2 of 2
Lightweight cryptography and authentication protocols for secure communications between resource-limited devices and wireless sensor networks: evaluation and implementation
(2010)
This dissertation examines the theoretical context for the security of wireless communication between ubiquitous computing devices and presents an implementation that addresses this need. The number of Resource-Limited ...
Evaluating elliptic curve cryptography for use on java card
(2003)
Smart cards are used as trusted storage and data processing systems to store cryptographic
private keys and other valuable information. Java Card promises the ease of programming
in Java to the world of smart cards. ...