A cryptography scheme through cascaded session based symmetric keys for ubiquitous computing

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A cryptography scheme through cascaded implementation of six sessions based symmetric key techniques, which are available in literature, has been proposed. The scheme may introduce new dimension to ensure data security at maximum possible level based on available infrastructure and is suitable for the security of the system in the paradigm of unify computing. The scheme is idle to trade-off between security and performance of light weight devices having very low processing capabilities or limited computing power.

Cite

CITATION STYLE

APA

Paul, M., & Mandal, J. K. (2015). A cryptography scheme through cascaded session based symmetric keys for ubiquitous computing. In Advances in Intelligent Systems and Computing (Vol. 337, pp. 525–532). Springer Verlag. https://doi.org/10.1007/978-3-319-13728-5_59

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free