File(s) under permanent embargo
Crossed crypto-scheme in WPA PSK mode
conference contribution
posted on 2023-05-23, 04:50 authored by Balitanas, MO, Robles, R, Kim, N, Kim, THAttaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC).
History
Publication title
Symposium on Bio-Inspried Learning and Intelligent Systems for Security (BLISS 2009)Editors
Stoica, Arslan, Erdogan, Higuchi, Bouidane El-RayisPagination
102-106ISBN
978-0-7695-3754-2Department/School
School of Information and Communication TechnologyPublisher
IEEE Computer Society PressPlace of publication
Los Alamitos, CAEvent title
Symposium on Bio-Inspried Learning and Intelligent Systems for Security (BLISS 2009)Event Venue
Edinburgh, UKDate of Event (Start Date)
2009-08-20Date of Event (End Date)
2009-08-22Rights statement
Copyright © 2009 IEEERepository Status
- Restricted