In today"s era of the ubiquitous computing, the Internet has become the main mode of data communication. Most of the devices used in wireless/mobile environments, that form wireless networks, ad-hoc networks and wireless sensor networks etc., have low computational power, memory and limited battery power. In such a Pervasive Computing environment, providing security to data becomes a complex task. Elliptic Curve Cryptography (ECC) has become the preferred choice for the pervasive computing environment because of its suitability to the devices having limited bandwidth, battery power, less computational resources and less memory. This paper provides an introduction to ECC and presents a survey on the current use of ECC in the pervasive computing environment. General Terms Security in pervasive environment.
CITATION STYLE
Katiyar, V., Dutta, K., & Gupta, S. (2010). A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment. International Journal of Computer Applications, 11(10), 41–46. https://doi.org/10.5120/1615-2171
Mendeley helps you to discover research relevant for your work.