End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices
暂无分享,去创建一个
[1] Douglas Stebila,et al. Performance analysis of elliptic curve cryptography for SSL , 2002, WiSE '02.
[2] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[3] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[4] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[5] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[6] V. Gupta,et al. Securing the wireless internet , 2001, IEEE Commun. Mag..
[7] Rich Helton,et al. Java Security Solutions , 2002 .
[8] Vipul Gupta,et al. Experiments in wireless Internet security , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).
[9] Bruce Schneier,et al. Ten Risks of PKI , 2004 .
[10] Paul Ashley,et al. Wired versus wireless security: the Internet, WAP and iMode for E-commerce , 2001, Seventeenth Annual Computer Security Applications Conference.