Energy and Processing Demand Analysis of TLS Protocol in Internet of Things Applications
暂无分享,去创建一个
[1] A. Emdadi,et al. Implementing the TLS Protocol on a Bare PC , 2010, 2010 Second International Conference on Computer Research and Development.
[2] Ali Ahmed,et al. Internet of Things: An end-to-end security layer , 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN).
[3] Matti Siekkinen,et al. TLS and energy consumption on a mobile device: A measurement study , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[4] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[5] Kenneth G. Paterson,et al. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.
[6] Behnam Dezfouli,et al. EMPIOT: An Energy Measurement Platform for Wireless IoT Devices , 2018, J. Netw. Comput. Appl..
[7] Michael Atighetchi,et al. Safe configuration of TLS connections , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[8] Abhijit Choudhury,et al. AES Galois Counter Mode (GCM) Cipher Suites for TLS , 2008, RFC.
[9] Mohamed Abid,et al. Adapting TLS handshake protocol for heterogenous IP-based WSN using identity based cryptography , 2010, 2010 International Conference on Wireless and Ubiquitous Systems.
[10] Debanjan Saha,et al. Transport layer security: how much does it really cost? , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[11] Dan Boneh,et al. An Experimental Study of TLS Forward Secrecy Deployments , 2014, IEEE Internet Computing.
[12] Habib-ur Rehman,et al. Future applications and research challenges of IOT , 2017, 2017 International Conference on Information and Communication Technologies (ICICT).
[13] Behnam Dezfouli,et al. REWIMO , 2017, ACM Trans. Sens. Networks.
[14] Anantha Chandrakasan,et al. An energy-efficient reconfigurable DTLS cryptographic engine for End-to-End security in iot applications , 2018, 2018 IEEE International Solid - State Circuits Conference - (ISSCC).
[15] Shay Gueron,et al. Fast prime field elliptic-curve cryptography with 256-bit primes , 2014, Journal of Cryptographic Engineering.
[16] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[17] Quan Zhang,et al. Improved TLS Handshake Protocols Using Identity-Based Cryptography , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.
[18] Vijay Kumar,et al. Security analysis of TLS authentication , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[19] Raghu Kacker,et al. TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach , 2016, 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS).
[20] Behnam Dezfouli,et al. Mobility-aware real-time scheduling for low-power wireless networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.