메뉴 건너뛰기




Volumn 28, Issue 10, 2004, Pages 585-594

Energy cost analysis of IPSec on handheld devices

Author keywords

Handheld devices; Low power computing; Security protocols; Wireless LAN

Indexed keywords

BANDWIDTH; CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; ENERGY UTILIZATION; INTERFACES (COMPUTER); INTERNET; LOCAL AREA NETWORKS; NETWORK PROTOCOLS; SECURITY OF DATA; STANDARDS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 7544236603     PISSN: 01419331     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.micpro.2004.08.010     Document Type: Article
Times cited : (5)

References (17)
  • 2
    • 0032165431 scopus 로고    scopus 로고
    • Security at the internet layer
    • R. Oppfiger, Security at the internet layer, Computer 31 (9) (1998) 43-47.
    • (1998) Computer , vol.31 , Issue.9 , pp. 43-47
    • Oppfiger, R.1
  • 3
    • 7544225344 scopus 로고    scopus 로고
    • IP AuthemticationHeader
    • S. Kent, R. Atkinson, IP AuthemticationHeader. IETF RFC 2402, 1998.
    • (1998) IETF RFC , vol.2402
    • Kent, S.1    Atkinson, R.2
  • 4
    • 0003315821 scopus 로고    scopus 로고
    • IP Encapsulating Security Payload (ESP)
    • S. Kent, R. Atkmsan. IP Encapsulating Security Payload (ESP). IEIF RFC 2406, 1998.
    • (1998) IEIF RFC , vol.2406
    • Kent, S.1    Atkmsan, R.2
  • 5
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the Internet protocol
    • S. Kent, R. Atkinson. Security Architecture for the Internet Protocol. IETF RFC 2401, 1998.
    • (1998) IETF RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 6
    • 84962888133 scopus 로고    scopus 로고
    • Energy impact of secure computation offloading on a handheld device
    • IEEE Computer Society Press, Los Alanritos, CA, November
    • Z. Li, R. Xu, Energy impact of secure computation offloading on a handheld device, IEEE Fifth Annual Workshop on Workload Characterization (WWC-5), IEEE Computer Society Press, Los Alanritos, CA, November 2002.
    • (2002) IEEE Fifth Annual Workshop on Workload Characterization (WWC-5)
    • Li, Z.1    Xu, R.2
  • 7
    • 7544238980 scopus 로고    scopus 로고
    • The use of HMAC-MD5-36 within ESP and AH
    • November
    • C. Madson, R. Glenn. The Use of HMAC-MD5-36 within ESP and AH. RFC 2403, November, 1998.
    • (1998) RFC , vol.2403
    • Madson, C.1    Glenn, R.2
  • 8
    • 7544249013 scopus 로고    scopus 로고
    • The use of HMAC-SHA4-96 within ESP and AH
    • November
    • C. Madson, R. Glenn. The Use of HMAC-SHA4-96 within ESP and AH. RFC 2404, November, 1998.
    • (1998) RFC , vol.2404
    • Madson, C.1    Glenn, R.2
  • 9
    • 0003272021 scopus 로고    scopus 로고
    • The Internet Key Exchange (IKE)
    • D. Harkins, D. Carael. The Internet Key Exchange (IKE). RFC 2409.
    • RFC , vol.2409
    • Harkins, D.1    Carael, D.2
  • 10
    • 84983089516 scopus 로고
    • The security of cipher block chaining
    • Y. Desmedt (Ed.), Proceedings of Advances in Cryptology (Crypto 94), Springer, Berlin
    • M. Bellare, I. kilian, P. Rogaway, The security of cipher block chaining in: Y. Desmedt (Ed.), Proceedings of Advances in Cryptology (Crypto 94), Lecture Notes in Computer Science 839, Springer, Berlin, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839
    • Bellare, M.1    Kilian, I.2    Rogaway, P.3
  • 13
    • 0038440906 scopus 로고    scopus 로고
    • Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol
    • February
    • S. Narayanaswamy, V. Kawadia, R.S. Sreenivas, P.R. Kumar, Power control in ad-hoc networks: theory, architecture, algorithm and implementation of the COMPOW protocol, European Wireless February (2002).
    • (2002) European Wireless
    • Narayanaswamy, S.1    Kawadia, V.2    Sreenivas, R.S.3    Kumar, P.R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.