46
IrIs BIometrIC modeL
3.2.2.2 Fields of Application Asymmetric cryptography has been
adopted in several areas, such as mobile networks for the safe delivery
of information and communication between different users (Grecas,
Maniatis, and Venieris 2001; Capkun, Hubaux, and Buttuán 2006),
Internet networks to protect users’ applications against unauthorized
interference (Parnes, Synnes, and Schefström 1999), and wireless net-
works to secure the transmission of data (Lee et al. 2008).
3.2.2.3 Advantages and Disadvantages e fact that the method of
asymmetric cryptography does not distribute the private key protects
transmitted information against unauthorized access.
e processes of encryption and decryption are executed quickly.
On the other hand ...