[1992 Proceedings] the Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications
DOI: 10.1109/pimrc.1992.279969
|View full text |Cite
|
Sign up to set email alerts
|

Security for personal communications services: public-key vs. private key approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Comparisons of the advantages and disadvantages of symmetric and asymmetric cryptography lead to a hybrid approach that combines both mechanisms. As the symmetric approach provides higher performance and is easier to implement in hardware it is used for data encryption whereas the symmetric key is exchanged based on asymmetric cryptography [BCY92].…”
Section: Symmetric Vs Asymmetric Cryptographymentioning
confidence: 99%
“…Comparisons of the advantages and disadvantages of symmetric and asymmetric cryptography lead to a hybrid approach that combines both mechanisms. As the symmetric approach provides higher performance and is easier to implement in hardware it is used for data encryption whereas the symmetric key is exchanged based on asymmetric cryptography [BCY92].…”
Section: Symmetric Vs Asymmetric Cryptographymentioning
confidence: 99%