메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 1-6

Energy efficient security services for limited wireless devices

Author keywords

Efficient; Energy; Limited; Security; Wireless

Indexed keywords

CRYPTOGRAPHIC ALGORITHMS; HIGH-LEVEL SECURITY; SECURITY SERVICES; WIRELESS RADIO TRANSMISSION;

EID: 33750419498     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (20)

References (19)
  • 1
    • 0001853125 scopus 로고
    • The computer of the 21st century
    • M. Weiser, "The Computer of the 21st Century," Scientific American, vol. 265, no. 3, pp. 66-75, 1991.
    • (1991) Scientific American , vol.265 , Issue.3 , pp. 66-75
    • Weiser, M.1
  • 2
    • 4544315117 scopus 로고    scopus 로고
    • On a framework for energy-efficient security protocols in wireless networks
    • P. Prasithsangaree and P. Krishnamurthy, "On a Framework for Energy-Efficient Security Protocols in Wireless Networks," Elsevier Computer Communications, vol. 27, no. 17, pp. 1716-1729, 2004.
    • (2004) Elsevier Computer Communications , vol.27 , Issue.17 , pp. 1716-1729
    • Prasithsangaree, P.1    Krishnamurthy, P.2
  • 3
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • A. K. Lenstra and E. R. Verheul, "Selecting Cryptographic Key sizes," Journal of Cryptology, vol. 14, no. 4, pp. 255-293, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 9
    • 0035360456 scopus 로고    scopus 로고
    • Software implementation strategies for power-conscious systems
    • K. Naik and D. S. L. Wei, "Software Implementation Strategies for Power-Conscious Systems," Mobile Networks and Applications, vol. 6, no. 3, pp. 291-305, 2001.
    • (2001) Mobile Networks and Applications , vol.6 , Issue.3 , pp. 291-305
    • Naik, K.1    Wei, D.S.L.2
  • 13
    • 0242660017 scopus 로고    scopus 로고
    • Adaptive secure software architecture for electronic commerce
    • S. W. Tak and E. K. Park, "Adaptive secure software architecture for electronic commerce," Software: Practice and Experience, vol. 33, no. 14, pp. 1343-1357, 2003.
    • (2003) Software: Practice and Experience , vol.33 , Issue.14 , pp. 1343-1357
    • Tak, S.W.1    Park, E.K.2
  • 15
    • 0033723263 scopus 로고    scopus 로고
    • The future of CMOS technology
    • R. D. Isaac, "The future of CMOS technology," IBM Journal of R&D, vol. 44, no. 3, pp. 369-378, 2000.
    • (2000) IBM Journal of R&D , vol.44 , Issue.3 , pp. 369-378
    • Isaac, R.D.1
  • 16
    • 0242410236 scopus 로고    scopus 로고
    • Will fuel cells replace batteries in mobile devices?
    • L. D. Paulson, "Will Fuel Cells Replace Batteries in Mobile Devices?," Computer, no., 2003.
    • (2003) Computer
    • Paulson, L.D.1
  • 17
    • 0001849866 scopus 로고    scopus 로고
    • The status of MD5 after a recent attack
    • H. Dobbertin, "The Status of MD5 after a Recent Attack," RSA Labs' CryptoBytes, vol. 2, no. 2, 1996.
    • (1996) RSA Labs' CryptoBytes , vol.2 , Issue.2
    • Dobbertin, H.1
  • 18
    • 84859682248 scopus 로고    scopus 로고
    • August 22
    • H. Krawczyk, IETF Email Archive, Available at http://www1.ietf.org/mail- archive/web/cfrg/current/msg 00527.html, August 22, 2004.
    • (2004) IETF Email Archive
    • Krawczyk, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.