Through Put Analysis of Various Encryption Algorithms
暂无分享,去创建一个
[1] Qamar Abbas,et al. Energy efficient sensor network security using Stream cipher mode of operation , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).
[2] William Stallings,et al. Cryptography and Network Security (4th Edition) , 2005 .
[3] P. Krishnamurthy,et al. Encryption and Power Consumption in Wireless LANs , 2001 .
[4] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..
[5] Thomas Hardjono,et al. Security in Wireless LANs and MANs , 2005 .
[6] K. ThirunadanaSikamani,et al. A secure PMS based on Fingerprint Authentication and Blowfish cryptographic algorithm , 2010, 2010 International Conference on Signal and Image Processing.
[7] William Stallings,et al. Cryptography and network security , 1998 .
[8] Diaa Salama Abdul. Elminaam,et al. Tradeoffs between Energy Consumption and Security of Symmetric Encryption Algorithms , 2009 .
[9] R. N. Uma,et al. Battery power-aware encryption , 2006, TSEC.
[10] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[11] Sohail A Hirani. Energy Consumption of Encryption Schemes in Wireless Devices , 2003 .