منابع مشابه
Energy cost analysis of IPSec on handheld devices
We analyze the computation overhead of the IP security protocol (IPSec) on a handheld device. We design experiments to quantify the energy consumed by the individual components in IPSec. We then experiment with several measures which can potentially cut the energy consumption without compromising security. Our results show that by replacing 3DES with Advanced Encryption Standard as the encrypti...
متن کاملComputational and Energy Costs of Cryptographic Algorithms on Handheld Devices
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launchin...
متن کاملSecurity Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizations require new strategies to mitigate the security risks associated with the integration of wireless technologies into existing computing environme...
متن کاملSignature Verification on Handheld Devices
Signature verification for handheld devices (e.g. smartphones, PDAs, etc.) as an authentication method is studied. Signature can be used to authenticate users in mobile networks for secure transactions. The challenges of signature verification on mobile devices are addressed and analyzed and the architecture for a verification platform is outlined. We propose a verification system adapted to ha...
متن کاملAuthenticating Users on Handheld Devices
Adequate user authentication is a persistent problem, particularly with handheld devices, which tend to be highly personal and at the fringes of an organization’s influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk, not only by the sensitive information they may contain, but also the means to access such information they may provide. U...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Queue
سال: 2003
ISSN: 1542-7730,1542-7749
DOI: 10.1145/957717.957768