Energy Efficient Data Encryption Techniques in Smartphones
暂无分享,去创建一个
[1] Rick Rogers,et al. Android Application Development - Programming with the Google SDK , 2009 .
[2] Yuanyuan Zhang,et al. Clustering Mobile Apps Based on Mined Textual Features , 2016, ESEM.
[3] Tao Zhang,et al. Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications , 2015, Secur. Commun. Networks.
[4] Khairulmizam Samsudin,et al. A framework for GPU-accelerated AES-XTS encryption in mobile devices , 2011, TENCON 2011 - 2011 IEEE Region 10 Conference.
[5] Birgit Pfitzmann,et al. Trusting Mobile User Devices and Security Modules , 1997, Computer.
[6] Ingrid Moerman,et al. A survey on wireless body area networks , 2011, Wirel. Networks.
[7] Johannes Götzfried,et al. ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices , 2013, 2013 International Conference on Availability, Reliability and Security.
[8] Luther Martin,et al. XTS: A Mode of AES for Encrypting Hard Disks , 2010, IEEE Security & Privacy.
[9] Garth V. Crosby,et al. Advances and challenges of wireless body area networks for healthcare applications , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[10] Ramesh Karri,et al. Optimizing the Energy Consumed by Secure Wireless Sessions – Wireless Transport Layer Security Case Study , 2003, Mob. Networks Appl..
[11] Tooska Dargahi,et al. On the Feasibility of Attribute-Based Encryption on Smartphone Devices , 2015, IoT-Sys@MobiSys.
[12] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[13] Morris J. Dworkin. SP 800-38E. Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices , 2010 .
[14] William Stallings,et al. Cryptography and network security , 1998 .
[15] Benjamin Halpert. Mobile device security , 2004, InfoSecCD '04.
[16] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[17] Dimitris Gritzalis,et al. Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..
[18] Sangwon Lee,et al. Wireless Body Area Networks: Where does energy go? , 2012, 2012 IEEE International Symposium on Workload Characterization (IISWC).
[19] M. Umaparvathi,et al. Evaluation of symmetric encryption algorithms for MANETs , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.