Security for Ambient Intelligent Systems

[1]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[2]  Ingrid Verbauwhede,et al.  Energy-Memory-Security Tradeoffs in Distributed Sensor Networks , 2004, ADHOC-NOW.

[3]  Bart Kienhuis,et al.  Architectures and design techniques for energy efficient embedded DSP and multimedia processing , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.

[4]  Ingrid Verbauwhede,et al.  A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.

[5]  William M. Springer Review of Cryptography: theory and practice, second edition by Douglas R. Stinson. CRC Press. , 2003, SIGA.

[6]  Ingrid Verbauwhede,et al.  Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology , 2003, CHES.

[7]  Patrick Schaumont,et al.  Domain-Specific Codesign for Embedded Security , 2003, Computer.

[8]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[9]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[10]  Mani Srivastava,et al.  Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..

[11]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[12]  Mau-Chung Frank Chang,et al.  Reconfigurable interconnect for next generation systems , 2002, SLIP '02.

[13]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[14]  Stefano Basagni,et al.  Secure pebblenets , 2001, MobiHoc '01.

[15]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[16]  Jan M. Rabaey,et al.  Wireless beyond the third generation-facing the energy challenge , 2001, ISLPED'01: Proceedings of the 2001 International Symposium on Low Power Electronics and Design (IEEE Cat. No.01TH8581).

[17]  Ed F. Deprettere,et al.  A Methodology to Design Programmable Embedded Systems - The Y-Chart Approach , 2001, Embedded Processor Design Challenges.

[18]  Frank Stajano,et al.  The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.

[19]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.

[20]  Louis Goubin,et al.  DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.

[21]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[22]  Markus G. Kuhn,et al.  Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[23]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[24]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[25]  Jan M. Rabaey,et al.  Digital integrated circuits: a design perspective / Jan M. Rabaey, Anantha Chandrakasan, Borivoje Nikolic , 2003 .

[26]  Ingrid Verbauwhede,et al.  The energy cost of secrets in ad-hoc networks , 2002 .

[27]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[28]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[29]  I. Verbauwhede,et al.  A reconfiguration hierarchy for elliptic curve cryptography , 2001, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256).

[30]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[31]  R. Comerford,et al.  No longer in denial [network security] , 2001 .

[32]  Joos Vandewalle,et al.  Hardware/software co-design of an elliptic curve public-key cryptosystem , 2001, 2001 IEEE Workshop on Signal Processing Systems. SiPS 2001. Design and Implementation (Cat. No.01TH8578).

[33]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .