Analysis of tradeoffs between security strength and energy savings in security protocols for WLANs
暂无分享,去创建一个
[1] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[2] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[3] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[4] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[5] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[6] G.E. Moore,et al. Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.
[7] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[8] A. M. Murray. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications , 1999 .
[9] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.
[10] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[11] P. Krishnamurthy,et al. Encryption and Power Consumption in Wireless LANs , 2001 .
[12] Krishna M. Sivalingam,et al. A Survey of Energy Efficient Network Protocols for Wireless Networks , 2001, Wirel. Networks.
[13] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[14] A. Sinha,et al. JouleTrack-a Web based tool for software energy profiling , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).
[15] Sagar Naik,et al. Software Implementation Strategies for Power-Conscious Systems , 2001, Mob. Networks Appl..
[16] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[17] A. Raghunathan,et al. Battery-driven system design: a new frontier in low power design , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[18] Jean Bacon,et al. A model of OASIS role-based access control and its support for active security , 2002, ACM Trans. Inf. Syst. Secur..
[19] Prashant Krishnamurthy,et al. Analysis of energy consumption of RC4 and AES algorithms in wireless LANs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[20] Wi-Fi Alliance,et al. Wi-Fi protected access , 2003 .
[21] Linda Dailey Paulson,et al. Will Fuel Cells Replace Batteries in Mobile Devices? , 2003, Computer.
[22] Elisa Bertino,et al. Dependencies and separation of duty constraints in GTRBAC , 2003, SACMAT '03.
[23] Sohail A Hirani. Energy Consumption of Encryption Schemes in Wireless Devices , 2003 .
[24] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[25] Prashant Krishnamurthy,et al. On a framework for energy-efficient security protocols in wireless networks , 2004, Comput. Commun..