Lightweight security algorithm for low power IoT devices
暂无分享,去创建一个
[1] K. Muneeswaran,et al. Implementation of text based cryptosystem using Elliptic Curve Cryptography , 2009, 2009 First International Conference on Advanced Computing.
[2] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[3] Kien A. Hua,et al. ThingStore: a platform for internet-of-things application development and deployment , 2015, DEBS.
[4] Dario Bonino,et al. ALMANAC: Internet of Things for Smart Cities , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.
[5] J. Pollard,et al. Monte Carlo methods for index computation () , 1978 .
[6] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[7] Milan Petkovic,et al. Secure Data Management : 10th VLDB workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings , 2014 .
[8] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Sneha A. Dalvi,et al. Internet of Things for Smart Cities , 2017 .
[11] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[12] Christian Callegari,et al. Advances in Computing, Communications and Informatics (ICACCI) , 2015 .
[13] Min Chen,et al. A Survey on Internet of Things From Industrial Market Perspective , 2015, IEEE Access.