-
1
-
-
70249141807
-
The internet of things, itu internet reports 2005
-
ITU
-
ITU, "The Internet of Things, ITU Internet Reports 2005", Executive Summary, 2005 (available at: http://www.itu.int/osg/spu/ publications/internetofthings/InternetofThings-summary.pdf ).
-
(2005)
Executive Summary
-
-
-
3
-
-
70249099710
-
Vulnerabilities of wireless environment
-
Cybernetics and Informatics, July 14-18, Orlando, FL, USA
-
R. Geddam, and R. Vasikarla, "Vulnerabilities of wireless environment," in Proc. 6th World Multiconference on Systemics, Cybernetics and Informatics, July 14-18, Orlando, FL, USA, 2002, pp. 471-476
-
(2002)
th World Multiconference on Systemics
, pp. 471-476
-
-
Geddam, R.1
Vasikarla, R.2
-
4
-
-
10444252457
-
Mobile phone vulnerabilities: A new generation of malware
-
Sept 1-3, Reading, UK
-
J. Jamaluddin, N. Zotou, R. Edwards, and P. Coulton, "Mobile phone vulnerabilities: A new generation of malware," in Proc. 2004 IEEE International Symposium on Consumer Electronic Conference, Sept 1-3, Reading, UK, 2004, pp199-201.
-
(2004)
Proc. 2004 IEEE International Symposium on Consumer Electronic Conference
, pp. 199-201
-
-
Jamaluddin, J.1
Zotou, N.2
Edwards, R.3
Coulton, P.4
-
5
-
-
84886998121
-
Applied cryptography: Protocols, algorithms, and source code in C
-
USA
-
B. Schneier, "Applied cryptography: protocols, algorithms, and source code in C," 2nd Ed, John Wiley & Sons, USA, 1996.
-
(1996)
nd Ed, John Wiley & Sons
-
-
Schneier, B.1
-
7
-
-
84871442641
-
On communication security in wireless ad-hoc sensor networks
-
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. Srivastava, "On communication security in wireless ad-hoc sensor networks," in Proc. 11 IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002, pp. 139-144
-
(2002)
Proc. 11 IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 139-144
-
-
Slijepcevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zimbeck, S.4
Srivastava, M.5
-
9
-
-
84962267980
-
Battery-driven system design: a new frontier in low power design
-
SI Design
-
K. Lahiri, A. Raghunathan S. Dey, and D Panigrahi, "Battery-driven system design: a new frontier in low power design," in Proc. Joint Asia and South Pacific Design Automation Conf./Int. Conf. VLSI Design, 2002, pp. 261-267
-
(2002)
Proc. Joint Asia and South Pacific Design Automation Conf./Int. Conf
, pp. 261-267
-
-
Lahiri, K.1
Raghunathan, A.2
Dey, S.3
Panigrahi, D.4
-
10
-
-
84893721283
-
Securing mobile appliances: Nw challenges for the system designer
-
A. Raghunathan, S. Ravi, S. Hattangady, and J-J. Quisquater, "Securing mobile appliances: new challenges for the system designer," Design, Automation and Test in Europe Conference and Exhibition (DATE'03), 2003.
-
(2003)
Design, Automation and Test in Europe Conference and Exhibition (DATE'03)
-
-
Raghunathan, A.1
Ravi, S.2
Hattangady, S.3
Quisquater, J.-J.4
-
11
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
I Labs, Network Associates, Inc., Glenwood,MD
-
D. Carman, P. Kruus, and B. Matt, "Constraints and approaches for distributed sensor network security," Tech. Rep. #00-010", NAI Labs, Network Associates, Inc., Glenwood, MD, 2000.
-
(2000)
Tech. Rep. #00-010"
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
12
-
-
70249085362
-
Analyzing and modelling encryption overhead for sensor network nodes
-
leigh, USA
-
P. Ganeson, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, "Analyzing and modelling encryption overhead for sensor network nodes", Centre of Embedded Systems Research, Raleigh, USA, 2003.
-
(2003)
Centre of Embedded Systems Research
-
-
Ganeson, P.1
Venugopalan, R.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
13
-
-
70249127386
-
Energy/ Security scalable mobile cryptosystem
-
mbridge, USA
-
Q. Huang, H. Kobayashi, B. Liu, D. Gu, and J. Zhang, "Energy/ Security Scalable Mobile Cryptosystem", Mitsubishi Research Laboratories, Cambridge, USA, 2004.
-
(2004)
Mitsubishi Research Laboratories
-
-
Huang, Q.1
Kobayashi, H.2
Liu, B.3
Gu, D.4
Zhang, J.5
-
14
-
-
70249110574
-
-
CryptoPP, available at
-
CryptoPP, "Crypto++ 5.2.1 Library", 2007, (available at http:// www.cryptopp.com).
-
(2007)
Crypto++ 5.2.1 Library
-
-
-
15
-
-
84944029559
-
New weakkey classes of IDEA
-
Springer
-
A. Biryukov, J. Nakahara, B. Preneel, and J. Vandewalle, "New weakkey classes of IDEA", in Proc. 4th International Conference on Information and Communications Security, ICICS 2002, LNCS, vol.2513, Springer, 2002, pp. 315-326
-
(2002)
th International Conference on Information and Communications Security, ICICS 2002, LNCS
, vol.2513
, pp. 315-326
-
-
Biryukov, A.1
Nakahara, J.2
Preneel, B.3
Vandewalle, J.4
|