Comparison between RSA hardware and software implementation for WSNs security schemes
暂无分享,去创建一个
[1] Amir Hossein Jahangir,et al. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .
[2] B. Kadri,et al. Secured Clustering Algorithm for Mobile Ad Hoc Networks , 2007 .
[3] Petr Hanácek,et al. Power Consumption of Hardware Cryptography Platform for Wireless Sensor , 2009, 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies.
[4] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[5] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[6] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[7] Kris Gaj,et al. Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware , 2000, AES Candidate Conference.
[8] J. Redi,et al. A brief overview of ad hoc networks: challenges and directions , 2002, IEEE Communications Magazine.
[9] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[10] Elfed Lewis,et al. Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes , 2008 .
[11] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[12] M. Bouaziz,et al. An Introduction to Computer Security , 2012 .
[13] Magdy Saeb,et al. FPGA implementation of the "pyramids" block cipher , 2005, Proceedings 2005 IEEE International SOC Conference.
[14] Sun-Min Hwang,et al. An Efficient Topology Control and Dynamic Interval Scheduling Scheme for 6LoWPAN , 2009, ICCSA.
[15] Sanjay Kumar Madria,et al. Practical algorithm for data security (PADS) in wireless sensor networks , 2007, MobiDE '07.
[16] Mohammad S. Obaidat,et al. Security in wireless sensor networks , 2009, Secur. Commun. Networks.