Now day's Mobile Networks are rapidly developing by performing e-commerce transactions such as online shopping, internet banking, and e- payment, etc. To promise secure communication while doing transactions, mutual authentication along with key agreement schemes are inspiring and also turning to be important. These schemes can be constructed from passwords, traditional public-key cryptography, and also using identity-based cryptography methods. In this context, an identity-based secure mutual authentication mechanism with key agreement schemes based on powerful elliptic curve cryptography are preferable solutions. This Book shows a secure and efficient identity-based mutual authentication with key agreement schemes for mobile client-server environments using MANETs. So that to provide efficient and more secure techniques is necessary. In this way, I proposed a random prime order key agreement protocol proposed for authentication and key agreement. Another technique is used to provide security of transferred data using the key xor data transpose technique, by using this technique we provide more security and more efficiency for transferring mutual data safely.
Now day's Mobile Networks are rapidly developing by performing e-commerce transactions such as online shopping, internet banking, and e- payment, etc. To promise secure communication while doing transactions, mutual authentication along with key agreement schemes are inspiring and also turning to be important. These schemes can be constructed from passwords, traditional public-key cryptography, and also using identity-based cryptography methods. In this context, an identity-based secure mutual authentication mechanism with key agreement schemes based on powerful elliptic curve cryptography are preferable solutions.
This Book shows a secure and efficient identity-based mutual authentication with key agreement schemes for mobile client-server environments using MANETs. So that to provide efficient and more secure techniques is necessary. In this way, I proposed a random prime order key agreement protocol proposed for authentication and key agreement. Another technique is used to provide security of transferred data using the key xor data transpose technique, by using this technique we provide more security and more efficiency for transferring mutual data safely.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Now day's Mobile Networks are rapidly developing by performing e-commerce transactions such as online shopping, internet banking, and e- payment, etc. To promise secure communication while doing transactions, mutual authentication along with key agreement schemes are inspiring and also turning to be important. These schemes can be constructed from passwords, traditional public-key cryptography, and also using identity-based cryptography methods. In this context, an identity-based secure mutual authentication mechanism with key agreement schemes based on powerful elliptic curve cryptography are preferable solutions.
This Book shows a secure and efficient identity-based mutual authentication with key agreement schemes for mobile client-server environments using MANETs. So that to provide efficient and more secure techniques is necessary. In this way, I proposed a random prime order key agreement protocol proposed for authentication and key agreement. Another technique is used to provide security of transferred data using the key xor data transpose technique, by using this technique we provide more security and more efficiency for transferring mutual data safely.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.