Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †
暂无分享,去创建一个
[1] Luigi Lo Iacono. Understanding Cryptography , 2018, CCNA® Security Study Guide.
[2] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[3] Srinivas Sampalli,et al. RFID encryption scheme featuring pseudorandom numbers and Butterfly seed generation , 2014, 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM).
[4] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[5] Mario Cagalj,et al. LIRA: A new key deployment scheme for Wireless Body Area Networks , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).
[6] Lili Wei,et al. A SHA-3 based RFID mutual authentication protocol and its implementation , 2013, 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013).
[7] Guangyu Zhu,et al. Symmetric key based RFID authentication protocol with a secure key-updating scheme , 2013, 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[8] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[9] Srinivas Sampalli,et al. A security suite for wireless body area networks , 2012, ArXiv.
[10] Joaquin Garcia-Alfaro,et al. Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[11] Honorio Martín,et al. AKARI-X: A pseudorandom number generator for secure lightweight systems , 2011, 2011 IEEE 17th International On-Line Testing Symposium.
[12] Jung-Hui Chiu,et al. A Novel Stream Cipher with Hash Function for the RFID Device , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[13] Enrique San Millán,et al. Cryptographically secure pseudo-random bit generator for RFID tags , 2010, 2010 International Conference for Internet Technology and Secured Transactions.
[14] Guang Gong,et al. A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[15] Yonghwan Kim,et al. PUF-based Encryption Processor for the RFID Systems , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[16] Kyung Sup Kwak,et al. Hybrid security mechanisms for wireless body area networks , 2010, 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN).
[17] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[18] Sudarshan K. Srinivasan,et al. Efficient hardware implementation of a new pseudo-random bit sequence generator , 2009, 2009 IEEE International Symposium on Circuits and Systems.
[19] Cormac J. Sreenan,et al. A context aware wireless body area network (BAN) , 2009, 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare.
[20] Guido Bertoni,et al. The Road from Panama to Keccak via RadioGatún , 2009, Symmetric Cryptography.
[21] G. Hollestelle. Systematic Analysis of Attacks on Security Protocols , 2005 .
[22] Ueli Maurer,et al. A universal statistical test for random bit generators , 1990, Journal of Cryptology.
[23] R. Bishop. On Separating Predictability and Determinism , 2003 .
[24] D. Poulin. A Rough Guide to Quantum Chaos , 2003 .
[25] Wade Trappe,et al. Introduction to Cryptography with Coding Theory , 2002 .
[26] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[27] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[28] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[29] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[30] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.
[31] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[32] E. Lorenz,et al. Predictability: Does the Flap of a Butterfly’s Wings in Brazil Set off a Tornado in Texas? , 2013 .
[33] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[34] E. Lorenz. Deterministic nonperiodic flow , 1963 .
[35] T. Sørensen,et al. A method of establishing group of equal amplitude in plant sociobiology based on similarity of species content and its application to analyses of the vegetation on Danish commons , 1948 .