By Topic

Study of management on the mobile public key infrastructure

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Kawamoto, K. ; R&D Center, NTT DoCoMo, Kanagawa, Japan ; Nakamura, N.

The demand for mobile telecommunication, once dominated by voice services, is increasingly moving towards data related services interconnected with the Internet, e.g. mobile e-commerce services. To secure data against threats such as intrusion or unauthorized access in the wireline (fixed) Internet, the public key infrastructure (PKI) (see Ford, W. and Baum, M. S., "Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption", Prentice-Hall, 1997) has been developed. It realizes authentication and confidentiality using public key cryptography technology. In order to solve the problems in the application of PKI to the mobile network, we propose a mobile PKI management architecture which extends the known Internet PKI management architecture with an efficient method of PKI data itemization, a process of user data acquisition, and a method of mobile PKI state management.

Published in:

Network Operations and Management Symposium, 2002. NOMS 2002. 2002 IEEE/IFIP

Date of Conference: