메뉴 건너뛰기




Volumn 2, Issue 2, 2006, Pages 204-231

An energy efficient security protocol for IEEE 802.11 WLANs

Author keywords

Cryptography; Energy efficiency; IEEE 802.11; Security; Wireless networks

Indexed keywords

CRYPTOGRAPHY; ENERGY EFFICIENCY; LOCAL AREA NETWORKS; SECURITY OF DATA; STANDARDS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 32644440048     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2005.11.002     Document Type: Article
Times cited : (3)

References (40)
  • 2
    • 0000793139 scopus 로고
    • Cramming more components onto integrated circuits
    • G.E. Moore Cramming more components onto integrated circuits Electronics 38 8 1965
    • (1965) Electronics , vol.38 , Issue.8
    • Moore, G.E.1
  • 4
    • 4544315117 scopus 로고    scopus 로고
    • On a framework for energy-efficient security protocols in wireless networks
    • P. Prasithsangaree, and P. Krishnamurthy On a framework for energy-efficient security protocols in wireless networks Elsevier Computer Communications 27 17 2004 1716 1729
    • (2004) Elsevier Computer Communications , vol.27 , Issue.17 , pp. 1716-1729
    • Prasithsangaree, P.1    Krishnamurthy, P.2
  • 8
    • 0003794883 scopus 로고    scopus 로고
    • Characterizing usage of a campus-wide wireless network
    • Dartmouth Computer Science, March
    • D. Kotz, K. Essien, Characterizing usage of a campus-wide wireless network, Technical Report TR2002-423, Dartmouth Computer Science, March 2002
    • (2002) Technical Report , vol.TR2002-423
    • Kotz, D.1    Essien, K.2
  • 15
    • 0003508558 scopus 로고    scopus 로고
    • Special Publication, FIPS PUB 197, November
    • NIST, Advanced Encryption Standard, Special Publication, FIPS PUB 197, November 2001
    • (2001) Advanced Encryption Standard
  • 16
    • 0347982694 scopus 로고    scopus 로고
    • On the security of the RC5 encryption algorithm
    • RSA Laboratories, September
    • B.S. Kaliski, Y.L. Yin, On the security of the RC5 encryption algorithm, Technical Report TR-602, Version 1.0, RSA Laboratories, September 1998
    • (1998) Technical Report TR-602, Version 1.0
    • Kaliski, B.S.1    Yin, Y.L.2
  • 17
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport Password authentication with insecure communication Communications of the ACM 24 11 1981 770 772
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 19
    • 0035360456 scopus 로고    scopus 로고
    • Software implementation strategies for power-conscious systems
    • K. Naik, and D.S.L. Wei Software implementation strategies for power-conscious systems Mobile Networks and Applications 6 3 2001 291 305
    • (2001) Mobile Networks and Applications , vol.6 , Issue.3 , pp. 291-305
    • Naik, K.1    Wei, D.S.L.2
  • 20
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • NAI Labs
    • D.W. Carmen, P.S. Kruus, B.J. Matt, Constraints and approaches for distributed sensor network security, Technical Report 00-010, NAI Labs, 2000
    • (2000) Technical Report , vol.10
    • Carmen, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 23
    • 0003629991 scopus 로고
    • Special Publication, FIPS PUB 180-1
    • NIST, Secure hash standard, Special Publication, FIPS PUB 180-1, 1995
    • (1995) Secure Hash Standard
  • 24
    • 19144369108 scopus 로고
    • Programming satan's computer
    • J.v. Leeuven, Computer Science Today: Recent Trends and Developments, Springer-Verlag
    • R. Anderson, and R. Needham Programming satan's computer J.v. Leeuven Computer Science Today: Recent Trends and Developments Lecture Notes in Computer Science vol. 1000 1995 Springer-Verlag
    • (1995) Lecture Notes in Computer Science , vol.1000
    • Anderson, R.1    Needham, R.2
  • 25
    • 0002652530 scopus 로고    scopus 로고
    • Security protocols and their properties
    • Marktoberdorf, Germany
    • M. Abadi, Security protocols and their properties, in: Proceedings of Foundations of Secure Computation, Marktoberdorf, Germany, 2000, pp. 39-60
    • (2000) Proceedings of Foundations of Secure Computation , pp. 39-60
    • Abadi, M.1
  • 27
    • 0001849866 scopus 로고    scopus 로고
    • The status of MD5 after a recent attack
    • H. Dobbertin The status of MD5 after a recent attack RSA Labs' CryptoBytes 2 2 1996
    • (1996) RSA Labs' CryptoBytes , vol.2 , Issue.2
    • Dobbertin, H.1
  • 31
    • 0035015898 scopus 로고    scopus 로고
    • Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
    • Anchorage, AK, USA
    • L.M. Feeney, M. Nilsson, Investigating the energy consumption of a wireless network interface in an ad hoc networking environment, in: Proceedings of IEEE INFOCOM, Anchorage, AK, USA, 2001
    • (2001) Proceedings of IEEE INFOCOM
    • Feeney, L.M.1    Nilsson, M.2
  • 33
    • 0242660017 scopus 로고    scopus 로고
    • Adaptive secure software architecture for electronic commerce
    • S.W. Tak, and E.K. Park Adaptive secure software architecture for electronic commerce Software: Practice and Experience 33 14 2003 1343 1357
    • (2003) Software: Practice and Experience , vol.33 , Issue.14 , pp. 1343-1357
    • Tak, S.W.1    Park, E.K.2
  • 35
  • 37
    • 0033723263 scopus 로고    scopus 로고
    • The future of CMOS technology
    • R.D. Isaac The future of CMOS technology IBM Journal of R&D 44 3 2000 369 378
    • (2000) IBM Journal of R&D , vol.44 , Issue.3 , pp. 369-378
    • Isaac, R.D.1
  • 38
    • 0242410236 scopus 로고    scopus 로고
    • Will fuel cells replace batteries in mobile devices?
    • L.D. Paulson Will fuel cells replace batteries in mobile devices? Computer 2003
    • (2003) Computer
    • Paulson, L.D.1
  • 40
    • 84858550258 scopus 로고    scopus 로고
    • August 22
    • H. Krawczyk http://www1.ietf.org/mail-archive/web/cfrg/current/msg00527. html August 22, 2004
    • (2004)
    • Krawczyk, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.