Microsoft Word - IMECS2011_Draft_Guo_and_Yu_fixed_20101229_2
نویسندگان
چکیده
In current mobile telecommunications systems, the security offered by these networks are limited. In order to be used in use cases that require a high degree of security, such as M2M (financial, voting system), more security guarantees are necessary. Therefore, additional security must be added on top of existing networks. A common way to add security is by the use of composite encryption schemes. Two (2) of these schemes are then compared in terms of performance: an Encrypt-and-MAC composite scheme represented by AES in CTR mode and in CMAC mode and an Encrypt-then-MAC scheme using the EAX mode. These schemes are used in the context of an over the top protocol in SMS networks used in M2M applications. Results show that performance in terms of transaction time is close between the two (2) composite schemes but the Encrypt-then-MAC scheme provides more guarantees. It is also show that online performance is better for the Encrypt-then-MAC composite scheme.
منابع مشابه
Solving Fuzzy Partial Differential Equation by Differential Transformation Method
Normal 0 false false false ...
متن کاملAccessible Instruction - Resources
Introduction to Accessible Education [2] Developing Courses [3] Writing a Course Syllabus [4] Creating Accessible Lectures [5] Using PowerPoint [6] Using Word Documents and/or PDFs [7] Microsoft Word Accessibility Video pt 1 [8] Microsoft Word Accessibility Video pt 2 [9] Evaluating Students and Giving Feedback [10] Using Microsoft Office Microsoft Office 2010 Accessibility Video [11] Microsoft...
متن کاملAccessible Instruction - Resources
Introduction to Accessible Education [2] Developing Courses [3] Writing a Course Syllabus [4] Creating Accessible Lectures [5] Using PowerPoint [6] Using Word Documents and/or PDFs [7] Microsoft Word Accessibility Video pt 1 [8] Microsoft Word Accessibility Video pt 2 [9] Evaluating Students and Giving Feedback [10] Using Microsoft Office Microsoft Office 2010 Accessibility Video [11] Microsoft...
متن کاملAccessible Instruction - Resources
Introduction to Accessible Education [2] Developing Courses [3] Writing a Course Syllabus [4] Creating Accessible Lectures [5] Using PowerPoint [6] Using Word Documents and/or PDFs [7] Microsoft Word Accessibility Video pt 1 [8] Microsoft Word Accessibility Video pt 2 [9] Evaluating Students and Giving Feedback [10] Using Microsoft Office Microsoft Office 2010 Accessibility Video [11] Microsoft...
متن کاملAccessible Instruction - Resources
Introduction to Accessible Education [2] Developing Courses [3] Writing a Course Syllabus [4] Creating Accessible Lectures [5] Using PowerPoint [6] Using Word Documents and/or PDFs [7] Microsoft Word Accessibility Video pt 1 [8] Microsoft Word Accessibility Video pt 2 [9] Evaluating Students and Giving Feedback [10] Using Microsoft Office Microsoft Office 2010 Accessibility Video [11] Microsoft...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010