A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment

  • Katiyar V
  • Dutta K
  • Gupta S
N/ACitations
Citations of this article
28Readers
Mendeley users who have this article in their library.

Abstract

In today"s era of the ubiquitous computing, the Internet has become the main mode of data communication. Most of the devices used in wireless/mobile environments, that form wireless networks, ad-hoc networks and wireless sensor networks etc., have low computational power, memory and limited battery power. In such a Pervasive Computing environment, providing security to data becomes a complex task. Elliptic Curve Cryptography (ECC) has become the preferred choice for the pervasive computing environment because of its suitability to the devices having limited bandwidth, battery power, less computational resources and less memory. This paper provides an introduction to ECC and presents a survey on the current use of ECC in the pervasive computing environment. General Terms Security in pervasive environment.

Cite

CITATION STYLE

APA

Katiyar, V., Dutta, K., & Gupta, S. (2010). A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment. International Journal of Computer Applications, 11(10), 41–46. https://doi.org/10.5120/1615-2171

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free