O'Reilly logo

Mobile Security and Privacy by Raymond Choo, Man Ho Au

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12

Performance of Digital Signature Schemes on Mobile Devices

D.Y.W. Liu*; G.Z. Xue; Y. Xie; X.P. Luo*; M.H. Au*    * The Hong Kong Polytechnic University, Kowloon, Hong Kong Xiamen University, Fujian, China

Abstract

Exchanges of information (with various types of documents, images and movies) among mobile devices are very common nowadays because these devices have been widely used in people’s daily lives. The fact that the information being handled may be sensitive and valuable has increased people’s awareness in the need for mobile security. In the context of digital communications, the common security requirements include authentication integrity and nonrepudiation. The standard solution is a technique from the cryptographic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required