-
2
-
-
0000793139
-
Cramming more components onto integrated circuits
-
G.E. Moore Cramming more components onto integrated circuits Electronics 38 8 1965
-
(1965)
Electronics
, vol.38
, Issue.8
-
-
Moore, G.E.1
-
3
-
-
84962267980
-
Battery-driven system design: A new frontier in low power design
-
Bangalore, India
-
K. Lahiri, A. Raghunathan, S. Dey, D. Panigrahi, Battery-driven system design: A new frontier in low power design, in: Proceedings of Asia South Pacific Design Automation Conference (ASP-DAC)/International Conference on VLSI Design, Bangalore, India, 2002, pp. 261-267
-
(2002)
Proceedings of Asia South Pacific Design Automation Conference (ASP-DAC)/International Conference on VLSI Design
, pp. 261-267
-
-
Lahiri, K.1
Raghunathan, A.2
Dey, S.3
Panigrahi, D.4
-
4
-
-
4544315117
-
On a framework for energy-efficient security protocols in wireless networks
-
P. Prasithsangaree, and P. Krishnamurthy On a framework for energy-efficient security protocols in wireless networks Elsevier Computer Communications 27 17 2004 1716 1729
-
(2004)
Elsevier Computer Communications
, vol.27
, Issue.17
, pp. 1716-1729
-
-
Prasithsangaree, P.1
Krishnamurthy, P.2
-
5
-
-
0842289234
-
Analysis of energy consumption of RC4 and AES algorithms in wireless LANs
-
San Francisco, CA
-
P. Prasithsangaree, P. Krishnamurthy, Analysis of energy consumption of RC4 and AES algorithms in wireless LANs, in: Proceedings of IEEE Global Communications Conference, Globecom'03, San Francisco, CA, 2003
-
(2003)
Proceedings of IEEE Global Communications Conference, Globecom'03
-
-
Prasithsangaree, P.1
Krishnamurthy, P.2
-
6
-
-
15344349982
-
State based key hop protocol: A lightweight security protocol for wireless networks
-
Venice, Italy
-
S. Michell, K. Srinivasan, State based key hop protocol: a lightweight security protocol for wireless networks, in: Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless ad hoc, Sensor, and Ubiquitous Networks, Venice, Italy, 2004, pp. 112-118
-
(2004)
Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
, pp. 112-118
-
-
Michell, S.1
Srinivasan, K.2
-
7
-
-
0036285946
-
Optimizing public-key encryption for wireless clients
-
New York, NY USA
-
N.R. Potlapally, S. Ravi, A. Raghunathan, G. Lakshminarayana, Optimizing public-key encryption for wireless clients, in: Proceedings of International Conference on Communications, ICC, New York, NY USA, 2002
-
(2002)
Proceedings of International Conference on Communications, ICC
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Lakshminarayana, G.4
-
8
-
-
0003794883
-
Characterizing usage of a campus-wide wireless network
-
Dartmouth Computer Science, March
-
D. Kotz, K. Essien, Characterizing usage of a campus-wide wireless network, Technical Report TR2002-423, Dartmouth Computer Science, March 2002
-
(2002)
Technical Report
, vol.TR2002-423
-
-
Kotz, D.1
Essien, K.2
-
9
-
-
32644439612
-
-
Ph.D. Dissertation, University of Pittsburgh, Pittsburgh, PA
-
P. Kiratiwintakorn, Energy efficient security framework for wireless local area networks, Ph.D. Dissertation, University of Pittsburgh, Pittsburgh, PA, 2005
-
(2005)
Energy Efficient Security Framework for Wireless Local Area Networks
-
-
Kiratiwintakorn, P.1
-
10
-
-
0003477171
-
Using the Fluhrer, Mantin, and Shamir attack to break WEP
-
August 21
-
A. Stubblefield, J. Ioannidis, A.D. Rubin, Using the Fluhrer, Mantin, and Shamir attack to break WEP, AT&T Labs Technical Report TD-4ZCPZZ Revision 2, August 21, 2001
-
(2001)
AT&T Labs Technical Report TD-4ZCPZZ Revision 2
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
-
15
-
-
0003508558
-
-
Special Publication, FIPS PUB 197, November
-
NIST, Advanced Encryption Standard, Special Publication, FIPS PUB 197, November 2001
-
(2001)
Advanced Encryption Standard
-
-
-
16
-
-
0347982694
-
On the security of the RC5 encryption algorithm
-
RSA Laboratories, September
-
B.S. Kaliski, Y.L. Yin, On the security of the RC5 encryption algorithm, Technical Report TR-602, Version 1.0, RSA Laboratories, September 1998
-
(1998)
Technical Report TR-602, Version 1.0
-
-
Kaliski, B.S.1
Yin, Y.L.2
-
17
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport Password authentication with insecure communication Communications of the ACM 24 11 1981 770 772
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
18
-
-
0003618441
-
-
Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST), October 2
-
J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, E. Roback, Report on the development of the advanced encryption standard (AES), Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST), October 2, 2000
-
(2000)
Report on the Development of the Advanced Encryption Standard (AES)
-
-
Nechvatal, J.1
Barker, E.2
Bassham, L.3
Burr, W.4
Dworkin, M.5
Foti, J.6
Roback, E.7
-
19
-
-
0035360456
-
Software implementation strategies for power-conscious systems
-
K. Naik, and D.S.L. Wei Software implementation strategies for power-conscious systems Mobile Networks and Applications 6 3 2001 291 305
-
(2001)
Mobile Networks and Applications
, vol.6
, Issue.3
, pp. 291-305
-
-
Naik, K.1
Wei, D.S.L.2
-
20
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
NAI Labs
-
D.W. Carmen, P.S. Kruus, B.J. Matt, Constraints and approaches for distributed sensor network security, Technical Report 00-010, NAI Labs, 2000
-
(2000)
Technical Report
, vol.10
-
-
Carmen, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
23
-
-
0003629991
-
-
Special Publication, FIPS PUB 180-1
-
NIST, Secure hash standard, Special Publication, FIPS PUB 180-1, 1995
-
(1995)
Secure Hash Standard
-
-
-
24
-
-
19144369108
-
Programming satan's computer
-
J.v. Leeuven, Computer Science Today: Recent Trends and Developments, Springer-Verlag
-
R. Anderson, and R. Needham Programming satan's computer J.v. Leeuven Computer Science Today: Recent Trends and Developments Lecture Notes in Computer Science vol. 1000 1995 Springer-Verlag
-
(1995)
Lecture Notes in Computer Science
, vol.1000
-
-
Anderson, R.1
Needham, R.2
-
25
-
-
0002652530
-
Security protocols and their properties
-
Marktoberdorf, Germany
-
M. Abadi, Security protocols and their properties, in: Proceedings of Foundations of Secure Computation, Marktoberdorf, Germany, 2000, pp. 39-60
-
(2000)
Proceedings of Foundations of Secure Computation
, pp. 39-60
-
-
Abadi, M.1
-
27
-
-
0001849866
-
The status of MD5 after a recent attack
-
H. Dobbertin The status of MD5 after a recent attack RSA Labs' CryptoBytes 2 2 1996
-
(1996)
RSA Labs' CryptoBytes
, vol.2
, Issue.2
-
-
Dobbertin, H.1
-
28
-
-
19944425657
-
-
X. Wang, D. Feng, X. Lai, and H. Yu Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD http://eprint.iacr.org/2004/199/ 2004
-
(2004)
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Yu, H.4
-
30
-
-
26844578344
-
-
X. Wang, Y.L. Yin, and H. Yu Collision Search Attacks on SHA1, February, 2005 http://theory.csail.mit.edu/~yiqun/shanote.pdf last access: March 30, 2005
-
Collision Search Attacks on SHA1, February, 2005
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
31
-
-
0035015898
-
Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
-
Anchorage, AK, USA
-
L.M. Feeney, M. Nilsson, Investigating the energy consumption of a wireless network interface in an ad hoc networking environment, in: Proceedings of IEEE INFOCOM, Anchorage, AK, USA, 2001
-
(2001)
Proceedings of IEEE INFOCOM
-
-
Feeney, L.M.1
Nilsson, M.2
-
32
-
-
0034593275
-
Quality of security service
-
Ballycotton, County Cork, Ireland
-
C. Irvine, T. Levin, Quality of security service, in: Proceedings of the 2000 Workshop on New Security Paradigms, NSPW'00, Ballycotton, County Cork, Ireland, 2000, pp. 91-99
-
(2000)
Proceedings of the 2000 Workshop on New Security Paradigms, NSPW'00
, pp. 91-99
-
-
Irvine, C.1
Levin, T.2
-
33
-
-
0242660017
-
Adaptive secure software architecture for electronic commerce
-
S.W. Tak, and E.K. Park Adaptive secure software architecture for electronic commerce Software: Practice and Experience 33 14 2003 1343 1357
-
(2003)
Software: Practice and Experience
, vol.33
, Issue.14
, pp. 1343-1357
-
-
Tak, S.W.1
Park, E.K.2
-
37
-
-
0033723263
-
The future of CMOS technology
-
R.D. Isaac The future of CMOS technology IBM Journal of R&D 44 3 2000 369 378
-
(2000)
IBM Journal of R&D
, vol.44
, Issue.3
, pp. 369-378
-
-
Isaac, R.D.1
-
38
-
-
0242410236
-
Will fuel cells replace batteries in mobile devices?
-
L.D. Paulson Will fuel cells replace batteries in mobile devices? Computer 2003
-
(2003)
Computer
-
-
Paulson, L.D.1
-
40
-
-
84858550258
-
-
August 22
-
H. Krawczyk http://www1.ietf.org/mail-archive/web/cfrg/current/msg00527. html August 22, 2004
-
(2004)
-
-
Krawczyk, H.1
|