메뉴 건너뛰기




Volumn 4080 LNCS, Issue , 2006, Pages 894-903

Analysis of the power consumption of secure communication in wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

CELLULAR TELEPHONE SYSTEMS; COMPUTER NETWORKS; INTERNET; NETWORK PROTOCOLS; SYSTEMS ANALYSIS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33749392369     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11827405_87     Document Type: Conference Paper
Times cited : (4)

References (20)
  • 2
    • 84941150574 scopus 로고    scopus 로고
    • IPSec Working Gruop. http://www.ietf.org/html.charters/ipsec-charter.html.
  • 3
    • 84941154725 scopus 로고    scopus 로고
    • TLS Working Group, http://www.ietf.org/html.charters/tls-charter.html.
  • 5
    • 0037376790 scopus 로고    scopus 로고
    • Optimizing the energy consumed by secure wireless sessions - Wireless transport layer security
    • Kluwer Academic Publishers
    • R. Karri and P. Mishra. Optimizing the Energy Consumed by Secure Wireless Sessions - Wireless Transport Layer Security. Mobile Networks and Applications, Kluwer Academic Publishers, pp.177-185, 2003.
    • (2003) Mobile Networks and Applications , pp. 177-185
    • Karri, R.1    Mishra, P.2
  • 6
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha. A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. IEEE Transaction on Mobile Computing, Vol. 5, No. 2, pp.128-143, 2005.
    • (2005) IEEE Transaction on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 7
    • 0036282229 scopus 로고    scopus 로고
    • Minimizing energy consumption of secure wireless session with QoS constraints
    • R. Karri and P. Mishra. Minimizing Energy Consumption of Secure Wireless Session with QoS Constraints. ICC'02, pp.2053-2057, 2002.
    • (2002) ICC'02 , pp. 2053-2057
    • Karri, R.1    Mishra, P.2
  • 8
    • 84949186835 scopus 로고    scopus 로고
    • Mutual authentication for low-powered mobile devices
    • M. Jakobsson and D. Pointcheval. Mutual Authentication for Low-Powered Mobile Devices. Financial Cryptogaphy, pp.178-195, 2001.
    • (2001) Financial Cryptogaphy , pp. 178-195
    • Jakobsson, M.1    Pointcheval, D.2
  • 9
    • 0035727184 scopus 로고    scopus 로고
    • Mutual authentication and key exchange for low power wireless communications
    • D. S. Wong and A. H. Chan. Mutual Authentication and Key Exchange for Low Power Wireless Communications. MILCOM'02, pp.39-43, 2002.
    • (2002) MILCOM'02 , pp. 39-43
    • Wong, D.S.1    Chan, A.H.2
  • 10
    • 0002290998 scopus 로고    scopus 로고
    • Power management techniques for mobile communication
    • R. Kravets and R. Krishnan. Power Management Techniques for Mobile Communication. MobiCom'99, 1999.
    • (1999) MobiCom'99
    • Kravets, R.1    Krishnan, R.2
  • 11
    • 0032097014 scopus 로고    scopus 로고
    • Power saving mechanisms in emerging standards for wireless LANs: The MAC-level prospective
    • H. Woesner, J. P. Ebert, M. Schlager, and A. Wolisz. Power Saving Mechanisms in Emerging Standards for Wireless LANs: The MAC-Level Prospective. IEEE Personal Communication System, pp.40-48, 1998.
    • (1998) IEEE Personal Communication System , pp. 40-48
    • Woesner, H.1    Ebert, J.P.2    Schlager, M.3    Wolisz, A.4
  • 12
    • 0003264517 scopus 로고    scopus 로고
    • PAMAS-Power Aware Multi-Access Protocol with Signaling for Ad-hoc networks
    • S. Singh and C. S. Raghavendra. PAMAS-Power Aware Multi-Access Protocol with Signaling for Ad-hoc Networks. Computer Communications Review, 1998.
    • (1998) Computer Communications Review
    • Singh, S.1    Raghavendra, C.S.2
  • 15
    • 84941159608 scopus 로고    scopus 로고
    • A new secure session exchange key protocol for wireless communication
    • Mohmad Badra et al.. A New Secure Session Exchange Key Protocol for Wireless Communication. IEEE PIMRC'03, 2003.
    • (2003) IEEE PIMRC'03
    • Badra, M.1
  • 16
    • 0036694365 scopus 로고    scopus 로고
    • Security in wireless communications
    • Kluwer Academic Publishers
    • Mohammad Ghulam Rahman and Hideki Imai. Security in Wireless Communications. Wireless Personal Communications, No. 22, Kluwer Academic Publishers, 2002.
    • (2002) Wireless Personal Communications , vol.22
    • Rahman, M.G.1    Imai, H.2
  • 17
    • 26444584806 scopus 로고
    • Resynchronization weakness in synchronous stream ciphers
    • J. Daemen, R. Govaerts, and J. Vandewalle, Resynchronization Weakness in Synchronous Stream Ciphers. EUROCRYPT'93, 1993.
    • (1993) EUROCRYPT'93
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 20


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.