暂无分享,去创建一个
[1] Gerard O'Regan. Texas Instruments , 1964, Nature.
[2] Pierangela Samarati,et al. Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. International Workshop, WISTP 2010, Passau, Germany , 2010 .
[3] Saurabh Bagchi,et al. Optimizing AES for embedded devices and wireless sensor networks , 2008, TRIDENTCOM.
[4] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[5] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[6] Kiran A Jadhav,et al. Wireless Sensor Networks Issues and Applications , 2012 .
[7] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[8] Ingrid Verbauwhede,et al. Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs , 2012, SPACE.
[9] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[10] Archana Bharathidasan,et al. Sensor Networks : An Overview , 2002 .
[11] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[12] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[13] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[14] Elena Trichina,et al. Combinational Logic Design for AES SubByte Transformation on Masked Data , 2003, IACR Cryptol. ePrint Arch..
[15] Aleksi Toivonen. Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks , 2007 .