-
1
-
-
77949877953
-
9390 Research Blvd
-
HART Communication Foundation HCF, Austin TX USA
-
HART Communication Foundation (HCF). 9390 Research Blvd., Suit I-350 Austin TX 78759 USA. http://www.hartcomm2.org/index.html.
-
Suit I-350
, pp. 78759
-
-
-
9
-
-
51049114271
-
10th international workshop on Cryptographic Hardware and Embedded Systems
-
30-44
-
A. Bogdanoy. Multiple-differential side-channel collision attacks on aes, lecture notes in computer science. 10th international workshop on Cryptographic Hardware and Embedded Systems, 5154(2):30-44, 2008.
-
(2008)
, vol.5154
, Issue.2
-
-
Bogdanoy, A.1
-
12
-
-
37349004156
-
Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality
-
May
-
M. Dworkin. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800-38C, May 2004.
-
(2004)
NIST Special Publication
, vol.800-38C
-
-
Dworkin, M.1
-
13
-
-
33144475784
-
Wormhole attacks in wireless networks
-
February
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2):370- 380, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
14
-
-
56349124194
-
When hart goes wireless: Understanding and implementing the wirelesshart standard
-
September
-
A. N. Kim, F. Hekland, S. Petersen, and P. Doyle. When hart goes wireless: Understanding and implementing the wirelesshart standard. IEEE International Conference on Emerging Technologies and Factory Automation, pages 899-907, September 2008.
-
(2008)
IEEE International Conference on Emerging Technologies and Factory Automation
, pp. 899-907
-
-
Kim, A.N.1
Hekland, F.2
Petersen, S.3
Doyle, P.4
-
15
-
-
60449113417
-
Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols
-
February
-
Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. ACM Transactions on Sensor Networks (TOSN), 1(5):71-80, February 2009.
-
(2009)
ACM Transactions on Sensor Networks (TOSN)
, vol.1
, Issue.5
, pp. 71-80
-
-
Law, Y.W.1
Palaniswami, M.2
Hoesel, L.V.3
Doumen, J.4
Hartel, P.5
Havinga, P.6
-
17
-
-
0020707363
-
Evaluation of the undetected error probability of single parity-check product codes
-
C. Leung. Evaluation of the undetected error probability of single parity-check product codes. IEEE Transactions on Communications, 31(2):250-253, 1983.
-
(1983)
IEEE Transactions on Communications
, vol.31
, Issue.2
, pp. 250-253
-
-
Leung, C.1
-
19
-
-
2642584905
-
Impossible differential cryptanalysis of 7-round aes
-
R. C.-W. Phan. Impossible differential cryptanalysis of 7-round aes. Information Processing Letters, 91(1):33-38, 2004.
-
(2004)
Information Processing Letters
, vol.91
, Issue.1
, pp. 33-38
-
-
Phan, R.C.-W.1
-
21
-
-
77949903223
-
PPP in HDLC Framing, RFC 1549
-
USA, December
-
W. Simpson. PPP in HDLC Framing, RFC 1549. IETF, Network Working Group, Fremont, California 94538 USA, December 1993.
-
(1993)
IETF, Network Working Group, Fremont, California 94538
-
-
Simpson, W.1
-
22
-
-
51249117686
-
Wirelesshart: Applying wireless technology in real-time industrial process control
-
April
-
J. Song, S. Han, A. K. Mok, D. Chen, M. Lucas, and M. Nixon. Wirelesshart: Applying wireless technology in real-time industrial process control. Real-Time and Embedded Technology and Applications Symposium, 2008(RTAS-08), pages 377-386, April 2008.
-
(2008)
Real-Time and Embedded Technology and Applications Symposium, 2008(RTAS-08)
, pp. 377-386
-
-
Song, J.1
Han, S.2
Mok, A.K.3
Chen, D.4
Lucas, M.5
Nixon, M.6
-
25
-
-
77949897173
-
-
H.Wang and Q. Li. Efficient implementation of public key cryptosystems on mote sensors. In Proceedings of International Conference on Information and Communication Security (ICICS), pages 33-38, 2004.
-
H.Wang and Q. Li. Efficient implementation of public key cryptosystems on mote sensors. In Proceedings of International Conference on Information and Communication Security (ICICS), pages 33-38, 2004.
-
-
-
-
26
-
-
49949083706
-
Elliptic curve cryptography-based access control in sensor networks
-
H. Wang, B. Sheng, and Q. Li. Elliptic curve cryptography-based access control in sensor networks. International Journal of Security and Networks, 1(3/4):127-137, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 127-137
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
27
-
-
77949891001
-
Counter with CBC-MAC (CCM), RFC 3610
-
USA, September
-
D. Whiting, R. Housley, and N. Ferguson. Counter with CBC-MAC (CCM), RFC 3610. IETF, Network Working Group, Fremont, California 94538 USA, September 2003.
-
(2003)
IETF, Network Working Group, Fremont, California 94538
-
-
Whiting, D.1
Housley, R.2
Ferguson, N.3
|