Security for Ambient Intelligent Systems
暂无分享,去创建一个
Ingrid Verbauwhede | Bo-Cheng Lai | A. Hodjat | David Hwang | I. Verbauwhede | D. Hwang | B. Lai | Alireza Hodjat
[1] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[2] Ingrid Verbauwhede,et al. Energy-Memory-Security Tradeoffs in Distributed Sensor Networks , 2004, ADHOC-NOW.
[3] Bart Kienhuis,et al. Architectures and design techniques for energy efficient embedded DSP and multimedia processing , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[4] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[5] William M. Springer. Review of Cryptography: theory and practice, second edition by Douglas R. Stinson. CRC Press. , 2003, SIGA.
[6] Ingrid Verbauwhede,et al. Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology , 2003, CHES.
[7] Patrick Schaumont,et al. Domain-Specific Codesign for Embedded Security , 2003, Computer.
[8] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[9] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[10] Mani Srivastava,et al. Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..
[11] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[12] Mau-Chung Frank Chang,et al. Reconfigurable interconnect for next generation systems , 2002, SLIP '02.
[13] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[14] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[15] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[16] Jan M. Rabaey,et al. Wireless beyond the third generation-facing the energy challenge , 2001, ISLPED'01: Proceedings of the 2001 International Symposium on Low Power Electronics and Design (IEEE Cat. No.01TH8581).
[17] Ed F. Deprettere,et al. A Methodology to Design Programmable Embedded Systems - The Y-Chart Approach , 2001, Embedded Processor Design Challenges.
[18] Frank Stajano,et al. The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.
[19] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[20] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[21] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[22] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[23] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[24] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[25] Jan M. Rabaey,et al. Digital integrated circuits: a design perspective / Jan M. Rabaey, Anantha Chandrakasan, Borivoje Nikolic , 2003 .
[26] Ingrid Verbauwhede,et al. The energy cost of secrets in ad-hoc networks , 2002 .
[27] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[28] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[29] I. Verbauwhede,et al. A reconfiguration hierarchy for elliptic curve cryptography , 2001, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256).
[30] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[31] R. Comerford,et al. No longer in denial [network security] , 2001 .
[32] Joos Vandewalle,et al. Hardware/software co-design of an elliptic curve public-key cryptosystem , 2001, 2001 IEEE Workshop on Signal Processing Systems. SiPS 2001. Design and Implementation (Cat. No.01TH8578).
[33] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .