We present the kernel implementation of a Mobile Certification Authority (MCA). Our MCA kernel is able to issue digital certificates fully-complying with the X.509v3 standard; it supports either RSA or ECDSA as a public key cryptosystem engine and; it can incorporate biometric-based user identification information (in the form of fingerprint recognition) to the digital certificate. The MCA application was entirely written in C++ and it was tested in an iPAQ Pocket PC h5550. Our experiments show that an ECDSA-based digital certificate using the NIST recommended 163K elliptic curve constitutes an ideal selection for wireless environments. Such certificate can be generated with a size of 1635 bytes, and 592 bytes when including (or not) biomet...
Over the past few years, the usage of mobile devices to access data has becoming more frequent, and ...
Recently the demand of mobile phones and their applications are increasing rapidly and as a result, ...
Due to the increase of the intelligence thieves, security systems in the industry are often being br...
With fast evolution of mobile devices and mobile network, the need of protecting user sensitive info...
Wireless networks are more and more common in current communications networks. Nevertheless, wireles...
A PKI (public key infrastructure) enables users of a basically unsecure public network to securely a...
A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that ...
[[abstract]]With the rapid development of information science and network technology, Internet has b...
In spite of the fact that digital signing is an essential requirement for implementation of e-govern...
Public key cryptography is an important aspect in Information Security. Since RSA is the most widely...
Securing the exchange of intellectual property and providing protection to multimedia contents in di...
The requirement of a Government-wide means of authenticating federal employ-ees and contractors stat...
With the advances in Information Technology (IT) there has been an increase in threats to the commun...
ACM 978-1-4503-2139-6/13/09...$15.00. Personal mobile devices (PMDs) have become ubiquitous technolo...
The ISO/IEEE 11073 family of standards recently announced was established to ensure plug-and-play in...
Over the past few years, the usage of mobile devices to access data has becoming more frequent, and ...
Recently the demand of mobile phones and their applications are increasing rapidly and as a result, ...
Due to the increase of the intelligence thieves, security systems in the industry are often being br...
With fast evolution of mobile devices and mobile network, the need of protecting user sensitive info...
Wireless networks are more and more common in current communications networks. Nevertheless, wireles...
A PKI (public key infrastructure) enables users of a basically unsecure public network to securely a...
A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that ...
[[abstract]]With the rapid development of information science and network technology, Internet has b...
In spite of the fact that digital signing is an essential requirement for implementation of e-govern...
Public key cryptography is an important aspect in Information Security. Since RSA is the most widely...
Securing the exchange of intellectual property and providing protection to multimedia contents in di...
The requirement of a Government-wide means of authenticating federal employ-ees and contractors stat...
With the advances in Information Technology (IT) there has been an increase in threats to the commun...
ACM 978-1-4503-2139-6/13/09...$15.00. Personal mobile devices (PMDs) have become ubiquitous technolo...
The ISO/IEEE 11073 family of standards recently announced was established to ensure plug-and-play in...
Over the past few years, the usage of mobile devices to access data has becoming more frequent, and ...
Recently the demand of mobile phones and their applications are increasing rapidly and as a result, ...
Due to the increase of the intelligence thieves, security systems in the industry are often being br...