Professional Documents
Culture Documents
Pearl 2004
Pearl 2004
23/11/11 10:33
springer.com
springerprotocols.com
English
GO
SEARCH FOR
AUTHOR OR EDITOR PAGE HOME PUBLICATION VOLUME ISSUE
Advanced Search
GO
Search Tips
MY SPRINGERLINK
Book
BROWSE
Series
TOOLS
HELP
SHOPPING CART
LOG IN
Related
COMPUTER SCIENCE
Cryptography for Network Security: Failures, Successes and Challenges Bart Preneel
Book Chapter
Introduction B. Preneel
Book Chapter
A Case Against Currently Used Hash Functions in RFID Protocols Martin Feldhofer
Book Chapter
Abstract
Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cryptographic algorithm for each mobile device has become a critical factor. In this paper, we present an approach for performance evaluation of cryptographic algorithms for mobile devices. A tool called PEARL (PErformance evaluAtor of cryptogRaphic aLgorithms for mobile devices) is also introduced in this work to validate the approach. This tool collects and analyzes information related to executions of the cryptographic algorithms in the mobile devices. Moreover, PEARL allows evaluating the performance of symmetrical and asymmetrical cryptographic algorithms, and hash functions for the J2ME platform.
Authentication, Identification Techniques, and Secure Containers Baseline Technologies Gabriele Spenger
Fulltext Preview
http://www.springerlink.com/content/plmh2m0kbken77ka/
Page 1 sur 2
SpringerLink - Abstract
23/11/11 10:33
citeulike
Connotea
Delicious
Impressum Contact us
http://www.springerlink.com/content/plmh2m0kbken77ka/
Page 2 sur 2