Secure E-auction for mobile users with low-capability devices in wireless network

5Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The existing secure e-auction schemes are shown to be too costly for users using mobile devices in wireless network as they heavily depend on costly asymmetric cipher. A new secure e-auction efficient enough for devices with low computation capability and limited communication bandwidth is designed in this paper. Most of its operations are symmetric cipher computations and the only asymmetric cipher operations it needs for a bidder are several multiplications. With so high efficiency, its still achieves the normal security properties of secure e-auction. © 2011 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Peng, K. (2011). Secure E-auction for mobile users with low-capability devices in wireless network. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6633 LNCS, pp. 351–360). https://doi.org/10.1007/978-3-642-21040-2_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free