메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 1142-1146

Encryption algorithms comparisons for wireless networked sensors

Author keywords

Embedded processors; Stream cipher; Symmetric cryptosystems; WSN

Indexed keywords

COMPUTATIONAL POWER; ENCRYPTION ALGORITHMS; MOORE'S LAW; SYMMETRIC CRYPTOSYSTEMS; WIRELESS SENSORS NETWORKS (WSN);

EID: 15744371681     PISSN: 1062922X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSMC.2004.1399777     Document Type: Conference Paper
Times cited : (21)

References (18)
  • 1
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • Sept.
    • M. Weiser, "The Computer for the 21st Century", Sci. Amer., Sept., 1991
    • (1991) Sci. Amer.
    • Weiser, M.1
  • 2
    • 0037341461 scopus 로고    scopus 로고
    • Pervasive computing: A paradigm for the 21st century
    • IEEE Computer Society Press, March
    • 2. D. Saha, A. Mukherjee, Pervasive Computing: A Paradigm for the 21st Century, IEEE Computer, IEEE Computer Society Press, pp. 25-31, March 2003.
    • (2003) IEEE Computer , pp. 25-31
    • Saha, D.1    Mukherjee, A.2
  • 4
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • Conference on Computer and Communications Security, Washington, DC, USA, April
    • Laurent Eschenauer and Virgil D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks", Conference on Computer and Communications Security. Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, pp. 41-47, April 2002.
    • (2002) Proceedings of the 9th ACM Conference on Computer and Communications Security , pp. 41-47
    • Eschenauer, L.1    Gligor, V.D.2
  • 5
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • Adrian Perrig and Robert Szewczyk et al. "SPINS: Security Protocols for Sensor Networks," Wireless Networks, Vol.8, pp. 521-534, 2002.
    • (2002) Wireless Networks , vol.8 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2
  • 6
    • 85180532806 scopus 로고    scopus 로고
    • Efficient distribution of keychain commitments for broadcast authentication in distributed sensor networks
    • San Diego, California, February
    • Donggang Liu and Peng Ning, "Efficient Distribution of KeyChain Commitments for Broadcast Authentication in Distributed Sensor Networks", the 10th Annual Network and Distributed System Security Symposium Conference, San Diego, California, pp. 263-276, February 2003.
    • (2003) The 10th Annual Network and Distributed System Security Symposium Conference , pp. 263-276
    • Liu, D.1    Ning, P.2
  • 8
    • 15744373467 scopus 로고    scopus 로고
    • smartdust. http://www.cs.berkeley.edu/~awoo/smartdust/
  • 9
    • 15744382824 scopus 로고    scopus 로고
    • TinyOS. http://webs.cs.berkeley.edu/tos/.
  • 12
    • 84944076741 scopus 로고    scopus 로고
    • Analysis methods for alleged RC4
    • Advances in Cryptology, Proceedings of ASIACRYPT'98, K. Ohta, D. Pei, Eds., Springer-Verlag, October
    • L.R. Knudsen, W. Meier, B. Preneel, V. Rijmen and S. Verdoolaege, "Analysis Methods for Alleged RC4", Advances in Cryptology, Proceedings of ASIACRYPT'98, LNCS 1514, K. Ohta, D. Pei, Eds., Springer-Verlag, pp 327-341, October 1998.
    • (1998) LNCS , vol.1514 , pp. 327-341
    • Knudsen, L.R.1    Meier, W.2    Preneel, B.3    Rijmen, V.4    Verdoolaege, S.5
  • 13
    • 84948990100 scopus 로고
    • The RC5 encryption algorithm
    • Fast Software Encryption, Springer-Verlag
    • R.L. Rivest, "The RC5 encryption algorithm", Fast Software Encryption, volume 1008 of Lecture Notes in Computer Science, Springer-Verlag, pp. 86-96, 1995.
    • (1995) Lecture Notes in Computer Science , vol.1008 , pp. 86-96
    • Rivest, R.L.1
  • 15
    • 0006540774 scopus 로고    scopus 로고
    • Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
    • Beijing, Springer-Verlag, November
    • John Kelsey, Bruce Schneier, and David Wagner, "Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA", International Conference on Information and Communications Security, Beijing, Springer-Verlag, pp. 233-246, November 1997.
    • (1997) International Conference on Information and Communications Security , pp. 233-246
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 16
    • 15744395962 scopus 로고    scopus 로고
    • Computer Laboratory Cambridge University
    • Roger Needham and David Wheeler, TEA Extension, Computer Laboratory Cambridge University, 1996. http://www.ftp.cl.cam.ac.uk/ftp/papers/djw-rmn/djw- rmn-tea.html.
    • (1996) TEA Extension
    • Needham, R.1    Wheeler, D.2
  • 17
    • 1542265638 scopus 로고    scopus 로고
    • US secure hash algorithm 1 (SHA1)
    • September
    • D. Eastlake and P. Jones. "US Secure Hash Algorithm 1 (SHA1)", IETF RFC 3174, September 2001. ftp://ftp.rfceditor.org/in-notes/rfc3174.txt
    • (2001) IETF RFC , vol.3174
    • Eastlake, D.1    Jones, P.2
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • February
    • R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, v. 21, n. 2, pp. 120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.