完整後設資料紀錄
DC 欄位語言
dc.contributor.authorHwu, Jing-Shyangen_US
dc.contributor.authorChen, Rong-Jayeen_US
dc.contributor.authorLin, Yi-Bingen_US
dc.date.accessioned2014-12-08T15:15:51Z-
dc.date.available2014-12-08T15:15:51Z-
dc.date.issued2006-09-01en_US
dc.identifier.issn1536-1276en_US
dc.identifier.urihttp://dx.doi.org/10.1109/TWC.2006.1687783en_US
dc.identifier.urihttp://hdl.handle.net/11536/11820-
dc.description.abstractIn the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper proposes an efficient ID-based encryption algorithm. We actually implement the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our study indicates that our solution outperforms a previously proposed algorithm by 20-35%.en_US
dc.language.isoen_USen_US
dc.subjectend-to-end securityen_US
dc.subjectidentity-based cryptographyen_US
dc.subjectmobile bankingen_US
dc.subjectpublic keyen_US
dc.titleAn efficient identity-based cryptosystem for end-to-end mobile securityen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/TWC.2006.1687783en_US
dc.identifier.journalIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONSen_US
dc.citation.volume5en_US
dc.citation.issue9en_US
dc.citation.spage2586en_US
dc.citation.epage2593en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000241050600036-
dc.citation.woscount10-
顯示於類別:期刊論文


文件中的檔案:

  1. 000241050600036.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。