-
1
-
-
0001853125
-
The computer of the 21st century
-
M. Weiser, "The Computer of the 21st Century," Scientific American, vol. 265, no. 3, pp. 66-75, 1991.
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 66-75
-
-
Weiser, M.1
-
2
-
-
4544315117
-
On a framework for energy-efficient security protocols in wireless networks
-
P. Prasithsangaree and P. Krishnamurthy, "On a Framework for Energy-Efficient Security Protocols in Wireless Networks," Elsevier Computer Communications, vol. 27, no. 17, pp. 1716-1729, 2004.
-
(2004)
Elsevier Computer Communications
, vol.27
, Issue.17
, pp. 1716-1729
-
-
Prasithsangaree, P.1
Krishnamurthy, P.2
-
3
-
-
0000653210
-
Selecting cryptographic key sizes
-
A. K. Lenstra and E. R. Verheul, "Selecting Cryptographic Key sizes," Journal of Cryptology, vol. 14, no. 4, pp. 255-293, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
5
-
-
0034445661
-
System architecture directions for network sensors
-
Boston, MA, USA
-
J. Hill, R. Szewozyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System architecture directions for network sensors," in Proceedings of ASPLOS, Boston, MA, USA, 2000, pp. 93-104.
-
(2000)
Proceedings of ASPLOS
, pp. 93-104
-
-
Hill, J.1
Szewozyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
6
-
-
1542376949
-
Analyzing and modeling encryption overhead for sensor network nodes
-
San Diego, CA, USA
-
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Siohitiu, "Analyzing and Modeling Encryption Overhead for Sensor Network Nodes," in Proceedings of Workshop on Wireless Sensor Networks and Applications (WSNA '03), San Diego, CA, USA, 2003.
-
(2003)
Proceedings of Workshop on Wireless Sensor Networks and Applications (WSNA '03)
-
-
Ganesan, P.1
Venugopalan, R.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Siohitiu, M.6
-
7
-
-
20344392154
-
Survey and benchmark of block ciphers for wireless sensor networks
-
Fort Lauderdale, Florida, USA
-
Y. W. Law, J. M. Doumen, and P. H. Hartel, "Survey and Benchmark of Block Ciphers for Wireless Sensor Networks," in Proceedings of The 1st IEEE Int. Conf. on Mobile Ad-hoc and Sensor Systems (MASS), Fort Lauderdale, Florida, USA, 2004.
-
(2004)
Proceedings of the 1st IEEE Int. Conf. on Mobile Ad-hoc and Sensor Systems (MASS)
-
-
Law, Y.W.1
Doumen, J.M.2
Hartel, P.H.3
-
8
-
-
0003618441
-
-
Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST) October 2
-
J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, and E. Robaok, "Report on the Development of the Advanced Encryption Standard (AES)," Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST) October 2, 2000.
-
(2000)
Report on the Development of the Advanced Encryption Standard (AES)
-
-
Nechvatal, J.1
Barker, E.2
Bassham, L.3
Burr, W.4
Dworkin, M.5
Foti, J.6
Robaok, E.7
-
9
-
-
0035360456
-
Software implementation strategies for power-conscious systems
-
K. Naik and D. S. L. Wei, "Software Implementation Strategies for Power-Conscious Systems," Mobile Networks and Applications, vol. 6, no. 3, pp. 291-305, 2001.
-
(2001)
Mobile Networks and Applications
, vol.6
, Issue.3
, pp. 291-305
-
-
Naik, K.1
Wei, D.S.L.2
-
10
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
D. W. Carmen, P. S. Kruus, and B. J. Matt, "Constraints and Approaches for Distributed Sensor Network Security," NAI Labs, Technical Report 00-010, 2000.
-
(2000)
NAI Labs, Technical Report 00-010
-
-
Carmen, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
12
-
-
0034593275
-
Quality of security service
-
Ballyootton, County Cork, Ireland
-
C. Irvine and T. Levin, "Quality of security service," in Proceedings of the 2000 workshop on New security paradigms (NSPW '00), Ballyootton, County Cork, Ireland, 2000, pp. 91-99.
-
(2000)
Proceedings of the 2000 Workshop on New Security Paradigms (NSPW '00)
, pp. 91-99
-
-
Irvine, C.1
Levin, T.2
-
13
-
-
0242660017
-
Adaptive secure software architecture for electronic commerce
-
S. W. Tak and E. K. Park, "Adaptive secure software architecture for electronic commerce," Software: Practice and Experience, vol. 33, no. 14, pp. 1343-1357, 2003.
-
(2003)
Software: Practice and Experience
, vol.33
, Issue.14
, pp. 1343-1357
-
-
Tak, S.W.1
Park, E.K.2
-
15
-
-
0033723263
-
The future of CMOS technology
-
R. D. Isaac, "The future of CMOS technology," IBM Journal of R&D, vol. 44, no. 3, pp. 369-378, 2000.
-
(2000)
IBM Journal of R&D
, vol.44
, Issue.3
, pp. 369-378
-
-
Isaac, R.D.1
-
16
-
-
0242410236
-
Will fuel cells replace batteries in mobile devices?
-
L. D. Paulson, "Will Fuel Cells Replace Batteries in Mobile Devices?," Computer, no., 2003.
-
(2003)
Computer
-
-
Paulson, L.D.1
-
17
-
-
0001849866
-
The status of MD5 after a recent attack
-
H. Dobbertin, "The Status of MD5 after a Recent Attack," RSA Labs' CryptoBytes, vol. 2, no. 2, 1996.
-
(1996)
RSA Labs' CryptoBytes
, vol.2
, Issue.2
-
-
Dobbertin, H.1
-
18
-
-
84859682248
-
-
August 22
-
H. Krawczyk, IETF Email Archive, Available at http://www1.ietf.org/mail- archive/web/cfrg/current/msg 00527.html, August 22, 2004.
-
(2004)
IETF Email Archive
-
-
Krawczyk, H.1
|