메뉴 건너뛰기




Volumn 3, Issue , 2003, Pages 1445-1449

Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CODES (SYMBOLS); COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; ENERGY UTILIZATION; HARDWARE; NETWORK PROTOCOLS; PACKET NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 0842289234     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (83)

References (21)
  • 4
    • 0035392857 scopus 로고    scopus 로고
    • A Survey of Energy Efficient Network Protocols for Wireless Networks
    • C.E. Jones, and et. al. "A Survey of Energy Efficient Network Protocols for Wireless Networks," Wireless Networks, 1, 343-358, 2001.
    • (2001) Wireless Networks , vol.1 , pp. 343-358
    • Jones, C.E.1
  • 7
    • 84947902207 scopus 로고    scopus 로고
    • Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the {Intel Pentium} Processor
    • B. Schneier and D. Whiting, "Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the {Intel Pentium} Processor," Lecture Notes in Computer Science, vol. 1267, pages 242-259, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1267 , pp. 242-259
    • Schneier, B.1    Whiting, D.2
  • 11
    • 0003853073 scopus 로고    scopus 로고
    • Power Evaluation of a Handheld Computer: A Case Study
    • 2001/1
    • M.A. Viredaz and D.A. Wallach, "Power Evaluation of a Handheld Computer: A Case Study," WRL Research Report, 2001/1.
    • WRL Research Report
    • Viredaz, M.A.1    Wallach, D.A.2
  • 13
    • 4544260599 scopus 로고    scopus 로고
    • Assessing Security-Critical Energy-Efficient Sensor Networks
    • Athens, Greece
    • Y.W Law, and et. al., "Assessing Security-Critical Energy-Efficient Sensor Networks," IFIP WG 11.2 Small Systems Security Conf., Athens, Greece.
    • IFIP WG 11.2 Small Systems Security Conf.
    • Law, Y.W.1
  • 15
    • 0037376790 scopus 로고    scopus 로고
    • Optimizing the Energy Consumed by Secure Wireless Sessions - Wireless Transport Layer Security Case Study
    • R. Karri and P. Mishra, "Optimizing the Energy Consumed by Secure Wireless Sessions - Wireless Transport Layer Security Case Study," Mobile Networks and Applications, 8, 177-185, 2003.
    • (2003) Mobile Networks and Applications , vol.8 , pp. 177-185
    • Karri, R.1    Mishra, P.2
  • 16
    • 0035015898 scopus 로고    scopus 로고
    • Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
    • Anchorage AK, April
    • L.M. Feeney, and M. Nilsson, "Investigating the energy consumption of a wireless network interface in an ad hoc networking environment.," In Proceedings of IEEE Infocom, Anchorage AK, April, 2001
    • (2001) Proceedings of IEEE Infocom
    • Feeney, L.M.1    Nilsson, M.2
  • 19
    • 0035360456 scopus 로고    scopus 로고
    • Software Implementation Strategies for Power-Conscious Systems
    • K. Naik, D. S.L. Wei, "Software Implementation Strategies for Power-Conscious Systems," Mobile Networks and Applications, 6, 291-305, 2001.
    • (2001) Mobile Networks and Applications , vol.6 , pp. 291-305
    • Naik, K.1    Wei, D.S.L.2
  • 20
    • 0000653210 scopus 로고    scopus 로고
    • Selecting Cryptographic Key sizes
    • A.K. Lenstra and E. R. Verheul, "Selecting Cryptographic Key sizes", Journal of Cryptology, vol. 14, no. 4, pp. 255-293, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.