A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN
暂无分享,去创建一个
[1] Madhumita Panda,et al. Security in Wireless Sensor Networks using Cryptographic Techniques , 2014 .
[2] Andrei V. Gurtov,et al. PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications , 2014, Int. J. Distributed Sens. Networks.
[3] Daehee Kim,et al. PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks , 2016, IEEE Sensors Journal.
[4] Xiuli Ren. Security Methods for Wireless Sensor Networks , 2006, 2006 International Conference on Mechatronics and Automation.
[5] Howard M. Heys,et al. Energy efficiency of encryption schemes applied to wireless sensor networks , 2012, Secur. Commun. Networks.
[6] S. Gajbhiye,et al. A Survey Report On Elliptic Curve Cryptography , 2011 .
[7] Monika,et al. Secure communication using DNA cryptography with secure socket layer (SSL) protocol in wireless sensor networks , 2015 .
[8] Monika Poriye,et al. Improved Security using DNA Cryptography in Wireless Sensor Networks , 2016 .
[9] Nitin Jirwan,et al. Review and Analysis of Cryptography Techniques , 2013 .
[10] Alaa Hussein Al-Hamami,et al. Enhanced Method for RSA Cryptosystem Algorithm , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[11] Mehran Alidoost Nia,et al. An Introduction to Digital Signature Schemes , 2014, ArXiv.
[12] Amir Hossein Jahangir,et al. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .
[13] Zhang Qi ming. Secure Digital Certificate Design Based on the Public Key Cryptography Algorithm , 2013 .
[14] Mohsen Guizani,et al. PKC Based Broadcast Authentication using Signature Amortization for WSNs , 2012, IEEE Transactions on Wireless Communications.
[15] T. Mandge,et al. A DNA encryption technique based on matrix manipulation and secure key generation scheme , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[16] V Vijayalakshmi,et al. Hybrid Key Management Scheme for Wireless Sensor Networks , 2015 .
[17] nbspGaurav R. Patel,et al. Hybrid Encryption Algorithm , 2014 .
[18] Muhammad Bilal,et al. Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN) , 2012, ArXiv.
[19] Swati Sarkar,et al. An Efficient Implementation of Digital Signature , 2015 .
[20] Vrijendra Singh,et al. Securing DNA Information through Public Key Cryptography , 2013 .
[21] P. Sharma,et al. Modified RSA Encryption Algorithm (MREA) , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[22] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[23] Habiba Drias,et al. An encryption algorithm inspired from DNA , 2010, 2010 International Conference on Machine and Web Intelligence.
[24] Guozhen Xiao,et al. New field of cryptography: DNA cryptography , 2006 .
[25] Rahul Hans,et al. A Review and Comparative Analysis of Various Encryption Algorithms , 2015 .
[26] Mahavir Jain. Implementation Of Hybrid Cryptography Algorithm , 2014 .
[27] Yanfeng Wang,et al. An encryption scheme using DNA technology , 2008, 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications.
[28] Kwok-Wo Wong,et al. On the security of symmetric ciphers based on DNA coding , 2014, Inf. Sci..
[29] Nitin Pandey,et al. Enhancement of security using cryptographic techniques , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).