eCite Digital Repository

Crossed crypto-scheme in WPA PSK mode


Balitanas, MO and Robles, R and Kim, N and Kim, TH, Crossed crypto-scheme in WPA PSK mode, Symposium on Bio-Inspried Learning and Intelligent Systems for Security (BLISS 2009), 20-22 August , Edinburgh, UK, pp. 102-106. ISBN 978-0-7695-3754-2 (2009) [Refereed Conference Paper]

Restricted - Request a copy

Copyright Statement

Copyright 2009 IEEE

DOI: doi:10.1109/BLISS.2009.23


Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC).

Item Details

Item Type:Refereed Conference Paper
Research Division:Information and Computing Sciences
Research Group:Cybersecurity and privacy
Research Field:Cybersecurity and privacy not elsewhere classified
Objective Division:Information and Communication Services
Objective Group:Communication technologies, systems and services
Objective Field:Communication technologies, systems and services not elsewhere classified
UTAS Author:Kim, TH (Dr Tai Kim)
ID Code:62429
Year Published:2009
Web of Science® Times Cited:2
Deposited By:Information and Communication Technology
Deposited On:2010-03-12
Last Modified:2015-02-13

Repository Staff Only: item control page