eCite Digital Repository

Crossed crypto-scheme in WPA PSK mode

Citation

Balitanas, MO and Robles, R and Kim, N and Kim, TH, Crossed crypto-scheme in WPA PSK mode, Symposium on Bio-Inspried Learning and Intelligent Systems for Security (BLISS 2009), 20-22 August , Edinburgh, UK, pp. 102-106. ISBN 978-0-7695-3754-2 (2009) [Refereed Conference Paper]

PDF
Restricted - Request a copy
8Mb
  

Copyright Statement

Copyright 2009 IEEE

DOI: doi:10.1109/BLISS.2009.23

Abstract

Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC).

Item Details

Item Type:Refereed Conference Paper
Research Division:Information and Computing Sciences
Research Group:Computer Software
Research Field:Computer System Security
Objective Division:Information and Communication Services
Objective Group:Communication Networks and Services
Objective Field:Communication Networks and Services not elsewhere classified
Author:Kim, TH (Dr Tai Kim)
ID Code:62429
Year Published:2009
Deposited By:Computing and Information Systems
Deposited On:2010-03-12
Last Modified:2015-02-13
Downloads:0

Repository Staff Only: item control page