End-To Security Implementation for Mobile Devices Using Tls Protocol
Loading...
Files
Date
Authors
Tuğlular, Tuğkan
Journal Title
Journal ISSN
Volume Title
Publisher
Open Access Color
BRONZE
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
End-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used on the Internet, together with its predecessor, SSL protocol. By implementing TLS protocol in the mobile world, the advantage of the proven security model of this protocol can be utilized. The main design goals of mobile end-to-end security protocol are maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object oriented architecture of proposed end-to-end security protocol implementation makes the replacement of this library with another cryptography package easier. The implementation has been experimented with different cases, which represent use of different cryptographic algorithms.
Description
Keywords
Transport Layer Security Protocol, End-to-end security, Mobile devices, Cryptography, Transport Layer Security Protocol, Mobile devices, Cryptography, End-to-end security
Fields of Science
05 social sciences, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 0503 education
Citation
Kayayurt, B., and Tuğlular, T. (2006). End-to-end security implementation for mobile devices using TLS protocol. Journal in Computer Virology, 2(1), 87-97. doi:10.1007/s11416-006-0017-x
WoS Q
Scopus Q

OpenCitations Citation Count
8
Volume
2
Issue
1
Start Page
87
End Page
97
PlumX Metrics
Citations
CrossRef : 5
Scopus : 9
Patent Family : 2
Captures
Mendeley Readers : 15
SCOPUS™ Citations
9
checked on Apr 28, 2026
Web of Science™ Citations
4
checked on Apr 28, 2026
Page Views
813
checked on Apr 28, 2026
Downloads
587
checked on Apr 28, 2026
Google Scholar™



