Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/2203
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kayayurt, Barış | - |
dc.contributor.author | Tuğlular, Tuğkan | - |
dc.date.accessioned | 2016-10-11T07:04:58Z | |
dc.date.available | 2016-10-11T07:04:58Z | |
dc.date.issued | 2006-08 | |
dc.identifier.citation | Kayayurt, B., and Tuğlular, T. (2006). End-to-end security implementation for mobile devices using TLS protocol. Journal in Computer Virology, 2(1), 87-97. doi:10.1007/s11416-006-0017-x | en_US |
dc.identifier.issn | 1772-9890 | |
dc.identifier.issn | 1772-9890 | - |
dc.identifier.uri | http://doi.org/10.1007/s11416-006-0017-x | |
dc.identifier.uri | http://hdl.handle.net/11147/2203 | |
dc.description.abstract | End-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used on the Internet, together with its predecessor, SSL protocol. By implementing TLS protocol in the mobile world, the advantage of the proven security model of this protocol can be utilized. The main design goals of mobile end-to-end security protocol are maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object oriented architecture of proposed end-to-end security protocol implementation makes the replacement of this library with another cryptography package easier. The implementation has been experimented with different cases, which represent use of different cryptographic algorithms. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Verlag | en_US |
dc.relation.ispartof | Journal in Computer Virology | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Transport Layer Security Protocol | en_US |
dc.subject | End-to-end security | en_US |
dc.subject | Mobile devices | en_US |
dc.subject | Cryptography | en_US |
dc.title | End-to-end security implementation for mobile devices using TLS protocol | en_US |
dc.type | Article | en_US |
dc.authorid | TR114656 | en_US |
dc.institutionauthor | Tuğlular, Tuğkan | - |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.volume | 2 | en_US |
dc.identifier.issue | 1 | en_US |
dc.identifier.startpage | 87 | en_US |
dc.identifier.endpage | 97 | en_US |
dc.identifier.wos | WOS:000215206000009 | en_US |
dc.identifier.scopus | 2-s2.0-33748938928 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1007/s11416-006-0017-x | - |
dc.relation.doi | 10.1007/s11416-006-0017-x | en_US |
dc.coverage.doi | 10.1007/s11416-006-0017-x | en_US |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | N/A | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Article | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
9
checked on Nov 15, 2024
WEB OF SCIENCETM
Citations
4
checked on Nov 9, 2024
Page view(s)
292
checked on Nov 18, 2024
Download(s)
580
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.