Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/2203
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKayayurt, Barış-
dc.contributor.authorTuğlular, Tuğkan-
dc.date.accessioned2016-10-11T07:04:58Z
dc.date.available2016-10-11T07:04:58Z
dc.date.issued2006-08
dc.identifier.citationKayayurt, B., and Tuğlular, T. (2006). End-to-end security implementation for mobile devices using TLS protocol. Journal in Computer Virology, 2(1), 87-97. doi:10.1007/s11416-006-0017-xen_US
dc.identifier.issn1772-9890
dc.identifier.issn1772-9890-
dc.identifier.urihttp://doi.org/10.1007/s11416-006-0017-x
dc.identifier.urihttp://hdl.handle.net/11147/2203
dc.description.abstractEnd-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used on the Internet, together with its predecessor, SSL protocol. By implementing TLS protocol in the mobile world, the advantage of the proven security model of this protocol can be utilized. The main design goals of mobile end-to-end security protocol are maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object oriented architecture of proposed end-to-end security protocol implementation makes the replacement of this library with another cryptography package easier. The implementation has been experimented with different cases, which represent use of different cryptographic algorithms.en_US
dc.language.isoenen_US
dc.publisherSpringer Verlagen_US
dc.relation.ispartofJournal in Computer Virologyen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectTransport Layer Security Protocolen_US
dc.subjectEnd-to-end securityen_US
dc.subjectMobile devicesen_US
dc.subjectCryptographyen_US
dc.titleEnd-to-end security implementation for mobile devices using TLS protocolen_US
dc.typeArticleen_US
dc.authoridTR114656en_US
dc.institutionauthorTuğlular, Tuğkan-
dc.departmentİzmir Institute of Technology. Computer Engineeringen_US
dc.identifier.volume2en_US
dc.identifier.issue1en_US
dc.identifier.startpage87en_US
dc.identifier.endpage97en_US
dc.identifier.wosWOS:000215206000009en_US
dc.identifier.scopus2-s2.0-33748938928en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.1007/s11416-006-0017-x-
dc.relation.doi10.1007/s11416-006-0017-xen_US
dc.coverage.doi10.1007/s11416-006-0017-xen_US
dc.identifier.scopusqualityQ3-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.fulltextWith Fulltext-
item.languageiso639-1en-
item.grantfulltextopen-
item.openairetypeArticle-
crisitem.author.dept03.04. Department of Computer Engineering-
Appears in Collections:Computer Engineering / Bilgisayar Mühendisliği
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File Description SizeFormat 
2203.pdfMakale572.23 kBAdobe PDFThumbnail
View/Open
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

9
checked on Apr 5, 2024

WEB OF SCIENCETM
Citations

4
checked on Mar 27, 2024

Page view(s)

182
checked on Apr 15, 2024

Download(s)

244
checked on Apr 15, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.