Learn More
The delayed message authentication protocol (DeMA protocol) is a protocol that can be used in order to exchange authentic information between two entities by using a one-way chain (i.e. an array of elements generated by a one-way function) on each entity's side. The use of the discrete power function in the DeMA protocol offers the advantage that the length(More)
Implementing cryptography on devices with low computational power is a necessity as they became involved in communications over public networks. Even more, these devices became ubiquitous and are used in a large area of applications, from home-office systems to industrial control systems. We deal with the design and implementation of a cryptographic(More)
The paper deals with the implementation of an authentication protocol, based on cryptographic techniques, that is used in the communication necessary for the control of a mobile robot over a public network. The robot is connected via an 802.11 wireless network to a local computer; however the control of the robot is done from a remote host over TCP/IP and(More)
Mobile phones are ubiquitous devices that begin to be involved in plenty of tasks in addition to their standard voice function. Using mobile phones to access remote information over TCP/IP is a common demand. However, when travel across networks, information is exposed to several security risks, and the use of cryptographic security unavoidable. Mobile(More)
Enterprise resource planning (ERP) systems are comprehensive information technology packages which aim towards managing and integrating all the business functions within a company. ERP is built on a totally integrated unique data warehouse. Business intelligence may be created based on the information stored in the data warehouse, to enable efficient(More)
  • 1