Mobile-to-Mobile Communication using Secured Shared Key
Journal Title: Engineering and Scientific International Journal - Year 2018, Vol 5, Issue 1
Abstract
In mobile networking, Mobile-to-Mobile communication helps in data exchange between actual and closest devices. The Mobile-to-Mobile communications are used to make short range communication. It improves the network performance and supports proximity based services. Our primary goal is to provide potential solution to mobile-to-mobile communications. In this paper we use an efficient key agreement protocol known as Diffie- Hellman key and commitment scheme. The proposed protocol has less computation and communication cost, while compared to other protocols.
Authors and Affiliations
Gopakumar G. S.
Analyzing Download time Performance of University Websites in India
The download time of website depends on various web components such as multimedia size, document size, program size and so on. The main objective of this paper is to Analyze Download time of University Websites in India...
Cow Dung for Reducing Aluminium Toxicity in Soil and Cow Importance from Vedic Scriptures
Aluminium is third most abundant element present in earth crust and if suppose it‟s concentration increases in soil and water than it affects plant root in which aluminium concentration is high and also if in water it co...
Mobile-to-Mobile Communication using Secured Shared Key
In mobile networking, Mobile-to-Mobile communication helps in data exchange between actual and closest devices. The Mobile-to-Mobile communications are used to make short range communication. It improves the network perf...
Resource Allocation of Efficient Energy in OFDM Systems using Distributed Antennas
We develop an energy-efficient resourceallocation scheme with proportional fairness for downlink multiuser orthogonal frequency-division multiplexing (OFDM) systems with distributed antennas. Our aim is to maximize energ...
Improving Iris Performance using Segmentation with CASIA Database
We can recognize humans each other according to their numerous characteristics of age. Identity verification (authentication) in computer systems has been traditionally based on something like password, key, card, pin an...