Filters








39 Hits in 5.2 sec

Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices [chapter]

Johann Großschädl, Dan Page, Stefan Tillich
2012 Lecture Notes in Computer Science  
However, most existing implementations of elliptic curve (EC) cryptography for J2ME do not perform well on resource-restricted devices, in most cases due to poor efficiency of the underlying arithmetic  ...  The Micro Edition of the Java 2 platform (J2ME) provides an application environment specifically designed to address the demands of embedded devices like cell phones, PDAs or set-top boxes.  ...  In the following sections, we describe our efforts to develop a performanceoptimized Java implementation of EC scalar multiplication for J2ME-enabled devices.  ... 
doi:10.1007/978-3-642-30955-7_17 fatcat:dniy2q6w3rec3dwo2pdemyurri

A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices [chapter]

Stefan Tillich, Johann Großschädl
2004 Lecture Notes in Computer Science  
We have implemented the Elliptic Curve Digital Signature Algorithm (ECDSA) for both signature generation and verification and we show that both can be done on a J2ME-enabled cell phonedepending on the  ...  This paper investigates the feasibility of public-key implementations on modern midrange to high-end devices, with the focus set on Elliptic Curve Cryptography (ECC).  ...  Acknowledgements The research described in this paper was supported by the Austrian Science Fund (FWF) under grant number P16952N04 "Instruction Set Extensions for Public-Key Cryptography".  ... 
doi:10.1007/978-3-540-30182-0_94 fatcat:wyh54jbe6nf4fivtmlwndasefa

An Experimental Study on Energy Consumption of Cryptographic Algorithms for Mobile Hand-Held Devices

K. SathishKumar, R. Sukumar, P. Asrin Banu
2012 International Journal of Computer Applications  
The capacity of battery grows up very slowly, which is insufficient for the electricity that the handheld devices demand, and thus designs and implementations of battery-efficient systems are in urgent  ...  Due to the continuous advancement in technology, mobile devices are playing important role in everyone"s day to day life.  ...  Target devices range from industrial controls to mobile phones and set-top boxes. Java ME was designed by Sun Microsystems, now a subsidiary of Corporation. Java ME devices implement a profile.  ... 
doi:10.5120/4917-7138 fatcat:krnuvsnh65fdpe7pqh7mvw5eim

Experiments in Wireless Internet Security [chapter]

Sumit Gupta, Vipul Gupta
2004 Statistics: A Series of Textbooks and Monographs  
Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future.  ...  This paper presents our experiences in implementing and using standard security mechanisms and protocols on small wireless devices.  ...  Sun, Sun Microsystems, Java, Java Card, J2SE, J2ME and iPlanet are trademarks or registered trademarks of Sun Microsystems, Inc., in the United States and other countries.  ... 
doi:10.1201/9781420030884.ch3 fatcat:xu4cqfq6dreznj5v3s5q4q73em

A proposed architecture for secure two-party mobile payment

J. E. Rice, Y. Zhu
2009 2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing  
The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems.  ...  Compared to some existing mobile payment platforms the proposed architecture is a lightweight secured mechanism that is more suitable for two-party banking transactions over resource-limited mobile devices  ...  Client → Bank : E(S(msg, ID C )) (1) Cryptography The Elliptic Curve Digital Signature Algorithm (ECDSA) is one approach to implementing the Digital Signature Algorithm (DSA).  ... 
doi:10.1109/pacrim.2009.5291393 fatcat:iukuwz7uqrgu3mack4fy3fuoom

A Trusted Platform Module for Near Field Communication

Michael Hutter, Ronald Toegl
2010 2010 Fifth International Conference on Systems and Networks Communications  
The architecture is based on elliptic-curve cryptography and provides efficient signing and verifying of the security-status report.  ...  As a proof-of-concept, we implemented an NFC-enabled TPM platform and show that a trust decision can be realized with commodity smart phones.  ...  ACKNOWLEDGMENTS The authors would like to thank Markus Pelnar for his valuable support in the practical realization of our investigations.  ... 
doi:10.1109/icsnc.2010.27 fatcat:yab7rzjysncnlmfmahdmexxgme

Building secure user-to-user messaging in mobile telecommunication networks

Shushan Zhao, Akshai Aggarwal, Shuping Liu
2008 Wireless Telecommunications Symposium  
We then propose a new solution for a secure messaging channel using identity-based cryptography.  ...  The advantage of this solution is that it does not require a large storage on mobile terminal side, which is especially essential for user-to-user communication.  ...  Java 2 Micro Edition (J2ME) is a Java platform that provides a standard environment for developing applications suitable for running on mobile devices.  ... 
doi:10.1109/wts.2008.4547559 dblp:conf/wts/ZhaoAL08 fatcat:vfqepp7khvduxohomcjf7rpad4

An efficient mobile PACE implementation

Alex Wiesmaier, Moritz Horsch, Johannes Braun, Franziskus Kiefer, Detlef Hhnlein, Falko Strenzke, Johannes Buchmann
2011 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11  
While there are efficient PACE implementations for smart cards, there does not seem to be an efficient and platform independent solution for mobile terminals.  ...  However, the benchmarks of our first, straightforward PACE implementation on an NFC-enabled mobile phone have shown that improvement is needed.  ...  CONCLUSION This paper presented an efficient Java ME implementation of the PACE protocol for mobile devices.  ... 
doi:10.1145/1966913.1966936 dblp:conf/ccs/WiesmaierHBKHSB11 fatcat:ght6lu4yorfujgdi25p3zdjgau

SMSSec: An end-to-end protocol for secure SMS

Johnny Li-Chang Lo, Judith Bishop, J.H.P. Eloff
2008 Computers & security  
Performance analysis showed that the encryption speed on the mobile device is faster than the duration of the transmission.  ...  The physical limitations of the intended devices such as mobile phones, made it necessary to develop a protocol which would make minimal use of computing resources.  ...  Service ECC GPRS General Packet Radio Service GSM Global System for Mobile communications HLR Home location register J2ME Java 2 Micro Edition MIDP Mobile Information Device Profile MS Mobile  ... 
doi:10.1016/j.cose.2008.05.003 fatcat:wucz52jmrbglbhgdroqby3buje

Service-oriented architecture for mobile applications

Yuri Natchetoi, Viktor Kaufman, Albina Shapiro
2008 Proceedings of the 1st international workshop on Software architectures and mobility - SAM '08  
This paper presents a novel lightweight mobile SOA-based architecture for business applications running on J2ME enabled devices such as cell phones.  ...  Mobile phones are becoming a new popular platform for business applications. The number of mobile users increases daily and so does the need for efficient mobile data access and management.  ...  In our design, we have decided to use an Elliptic Curve Cryptography [26] because it allows for much shorter public keys with the same encryption strength.  ... 
doi:10.1145/1370888.1370896 fatcat:6ofyv3gbn5eo5jrqnvrggx7x3u

A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment

Kai Xi, Tohari Ahmad, Fengling Han, Jiankun Hu
2010 Security and Communication Networks  
We also tested the computational costs and efficiency of our protocol on the CLDC emulator using Java ME (previous J2ME) programming technology.  ...  In this protocol, fingerprint biometric is used in user verification, protected by a computationally efficient Public Key Infrastructure (PKI) scheme, Elliptic Curve Cryptography (ECC).  ...  Furthermore, we implement our algorithm on Java ME emulator for the test of memory usage and computational efficiency.  ... 
doi:10.1002/sec.225 fatcat:qjoubttrhfd5bmh3esa3oowl2a

Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography

Ghadah Aldabbagh, Daniyal M. Alghazzawi, Syed Hamid Hasan, Mohammed Alhaddad, Areej Malibari, Li Cheng
2021 Applied Sciences  
This paper proposes a cloud-based mobile learning system using a hybrid optimal elliptic curve cryptography (HOECC) algorithm comprising public and private keys for data encryption.  ...  The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.  ...  Acknowledgments: This project was funded by the National Plan for Science, Technology and Innovation (MAARIFAH), King Abdulaziz City for Science and Technology, the Kingdom of Saudi Arabia, award number  ... 
doi:10.3390/app11125316 fatcat:ijoxn4m6nnenpksnitf2b47prq

Privacy-preserving management of transactions' receipts for mobile environments

Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer, Jungha Woo, Elisa Bertino
2009 Proceedings of the 8th Symposium on Identity and Trust on the Internet - IDtrust '09  
We have developed a version of such protocol for Near Field Communication (NFC) enabled cellular phones.  ...  Users increasingly use their mobile devices for electronic transactions to store related information, such as digital receipts. However, such information can be target of several attacks.  ...  We remark that this choice of implementation is not intrinsic to the Pedersen commitment scheme itself -it can be implemented with any suitable abelian groups, e.g., elliptic curves over finite fields.  ... 
doi:10.1145/1527017.1527027 dblp:conf/idtrust/PaciSKSWB09 fatcat:2pl2mxuakrhkln2v2q3lhxwlgm

Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities [chapter]

Marc-Michael Bergfeld, Holger Bock, Roderick Bloem, Jan Blonk, Gregory Conti, Kurt Dietrich, Matthias Junk, Florian Schreiner, Stephan Spitz, Johannes Winter
2012 Lecture Notes in Computer Science  
Cryptography and Privacy Protecting Technologies for Embedded Systems Privacy Enhancing Technologies for Embedded Systems • 15 Name Type Size T 1 Elliptical Curve Point |G 1 | T 2 Elliptical Curve Point  ...  Performance results of our implementation on mobile devices can be found in [10] .  ... 
doi:10.1007/978-3-642-32287-7_30 fatcat:5jrij2mqvrcgjokjgvhz62spfe

Security as a new dimension in embedded system design

Srivaths Ravi, Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan
2004 Proceedings of the 41st annual conference on Design automation - DAC '04  
Security has been the subject of intensive research in the areas of cryptography, computing, and networking.  ...  impact of security on battery life for batterypowered systems, etc.).  ...  Newer public-key algorithms such as Elliptic Curve Cryptography (ECC) [52] focus on computationally faster operations and smaller operands; ECC on binary fields perform polynomial multiplication rather  ... 
doi:10.1145/996566.996771 dblp:conf/dac/RaviKLMR04 fatcat:z2yobwi7kneo7ipdhjfulk32ay
« Previous Showing results 1 — 15 out of 39 results