draft PDF
Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cryptographic algorithm for each mobile device has become a critical factor. In this paper, we present an approach for performance evaluation of cryptographic algorithms for mobile devices. To validate the approach, a tool called PEARL (PErformance evaluAtor of cryptogRaphic aLgorithms for mobile devices) is introduced. This tool collects and analyzes information related to the executions of the cryptographic algorithms in the mobile devices. PEARL also allows evaluating the performance of symmetrical and asymmetrical cryptographic algorithms and hashing functions for the J2ME platform.
Reference:
VIANA, Windson ; FILHO, Bringel ; CASTRO, R. M. C. . PEARL: a PErformance evaluaAtor of cRyptographic aLgorithms for mobile devices. In: The First International Workshop on Mobility Aware Technologies and Applications (MATA 2004). Florianópolis-PR, Brasil, Outubro 2004 . Lecture Notes in Computer Science, MATA 2004 Conference, v. 3284, 2004.
Aucun commentaire:
Enregistrer un commentaire