Studying the Effects of Most Common Encryption Algorithms
暂无分享,去创建一个
Mohey M. Hadhoud | Diaa Salama Abd Elminaam | Hatem Mohamed Abdual-Kader | M. M. Hadhoud | H. M. Abdual-Kader
[1] Sagar Naik,et al. Software implementation strategies for power-conscious systems , 1999, Mobile Networks and Computing.
[2] A T Karygiannis,et al. Wireless Network Security: 802.11, Bluetooth and Handheld Devices , 2002 .
[3] James Kempf. Wireless Internet Security - Architecture and Protocols , 2008 .
[4] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[5] Thomas Hardjono,et al. Security in Wireless LANs and MANs , 2005 .
[6] R. N. Uma,et al. Battery power-aware encryption , 2006, TSEC.
[7] Vincent Rijmen,et al. Rijndael, the advanced encryption standard , 2001 .
[8] Joseph Y. Halpern,et al. Minimum-energy mobile wireless networks revisited , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[9] Nathan Ickes,et al. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks , 2001, MobiCom '01.
[10] William Stallings,et al. Cryptography and Network Security (4th Edition) , 2005 .
[11] P. Krishnamurthy,et al. Encryption and Power Consumption in Wireless LANs , 2001 .
[12] Anantha Chandrakasan,et al. JouleTrack: a web based tool for software energy profiling , 2001, DAC '01.
[13] R. Badlishah Ahmad,et al. Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers , 2008 .
[14] Osama M. Abu Zaid,et al. Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..
[15] Prashant Krishnamurthy,et al. Analysis of energy consumption of RC4 and AES algorithms in wireless LANs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[16] Praphul Chandra. BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering) , 2005 .
[17] Sujit Dey,et al. Embedded Tutorial: Battery-Driven System Design: A New Frontier in Low Power Design. , 2002 .
[18] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[19] B. Brown. 802.11: the security differences between b and i , 2003 .
[20] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..