WTLS Protocol Architecture

WTLS Protocol Architecture

Who could provide me with a summary of WTLS Protocol Architecture?

Also includes the followings:

– WTLS Record Protocol: WTLS Protocol Stack and WTLS Record Protocol Operation

– Change Cipher Spec Protocol: WTLS Record Format

– A real life example of Wireless Transport Layer Security (WTLS) with an explanation.

http://www.tml.tkk.fi/Opinnot/Tik-110.501/1999/papers/wtls/wtls.html

Answer Preview

The Wireless Transport Layer Security uses certificates in authentication purposes. While authenticating information, both the client and the server information are authenticated but in some cases the server gets authenticated by the client. This occurs only when the server allows it. Finally, the proposed architecture can be used as a powerful security engine, in WAP communication networks, with special security demands….

(633 Words)

Scroll to Top