Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Asymmetric Key Cryptography or Public Key Cryptography

Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts
In asymmetric key cryptography, the algorithms for encryption and decryption make use of a different key, called the private and public key respectively. Consequently, each user possesses a pair of keys: the private key that is kept secret and the public key that may be widely distributed. The algorithms are based on one way functions, i.e. functions that are only easy to evaluate if some trapdoor information is known.
Published in Chapter:
Secure Techniques for Remote Reconfiguration of Wireless Embedded Systems
Abdellah Touhafi (Vrije Universiteit Brussel, Belgium), An Braeken (Erasmushogeschool Brussel, Belgium), Gianluca Cornetta (Universidad CEU San Pablo, Spain), Nele Mentens (Katholieke Universiteit Leuven, Belgium), and Kris Steenhaut (Vrije Universiteit Brussel, Belgium)
DOI: 10.4018/978-1-60960-042-6.ch058
Abstract
The aim of this chapter is to give a thorough overview of secure remote reconfiguration technologies for wireless embedded systems, and of the communication standard commonly used in those systems. In particular, we focus on basic security mechanisms both at hardware and protocol level. We will discuss the possible threats and their corresponding impact level. Different countermeasures for avoiding these security issues are explained. Finally, we present a complete and compact solution for a service-oriented architecture enabling secure remote reconfiguration of wireless embedded systems, called the STRES system.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR