-
1
-
-
51349161002
-
Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks
-
Korea, April
-
W. K. Koo, H. Lee, Y. H. Kim and D. H. Lee, "Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks," in Proc of 2008 Information Security and Assurance (ISA 2008), pp.73-76, Korea, April 2008.
-
(2008)
Proc of 2008 Information Security and Assurance (ISA 2008)
, pp. 73-76
-
-
Koo, W.K.1
Lee, H.2
Kim, Y.H.3
Lee, D.H.4
-
2
-
-
33745269795
-
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks
-
Feb.
-
Y. W. Law, J. Doumen, and P. Hartel, "Survey and Benchmark of Block Ciphers for Wireless Sensor Networks," ACM Transactions on Sensor Networks (TOSN), vol. 2, no. 1, pp. 65-93, Feb. 2006.
-
(2006)
ACM Transactions on Sensor Networks (TOSN)
, vol.2
, Issue.1
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
3
-
-
62949109556
-
LRSA: Lightweight Rabbit Based Security Architecture for Wireless Sensor Networks
-
China, Dec.
-
R. Tahir, M. Y. Javed, M. Tahir and F. Imam, "LRSA: Lightweight Rabbit Based Security Architecture for Wireless Sensor Networks," in Proc of 2008 Intelligent Information Technology Application (IITA '08), vol.3, pp. 679-683, China, Dec. 2008.
-
(2008)
Proc of 2008 Intelligent Information Technology Application (IITA '08)
, vol.3
, pp. 679-683
-
-
Tahir, R.1
Javed, M.Y.2
Tahir, M.3
Imam, F.4
-
4
-
-
26444574670
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
New York, November
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," in Proc of the 2nd international Conference on Embedded Networked Sensor Systems (SenSys '04), pp. 162-175, New York, November 2004.
-
(2004)
Proc of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04)
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
5
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
Sept.
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks," ACM Wireless Networks, vol. 8, no. 5, pp. 521-534, Sept. 2002.
-
(2002)
ACM Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
6
-
-
56949088196
-
A Survey of Security Issues in Wireless Sensor Networks
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks," IEEE Communications Surveys & Tutorials, vol.8, no.2, pp. 2-23, 2006.
-
(2006)
IEEE Communications Surveys & Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
8
-
-
77955370154
-
-
National Institute of Standards and Technology (NIST), Special Publication (SP) 800-38A, May
-
National Institute of Standards and Technology (NIST), "Proposal To Extend CBC Mode By Ciphertext Stealing," Special Publication (SP) 800-38A, May. 2007.
-
(2007)
Proposal to Extend CBC Mode by Ciphertext Stealing
-
-
-
10
-
-
84965066515
-
Advanced Encryption Standard (AES)
-
National Institute of Standards and Technology (NIST), Nov.
-
National Institute of Standards and Technology (NIST), "Advanced Encryption Standard (AES)," Federal Information Processing Standard (FIPS) 197, Nov. 2001.
-
(2001)
Federal Information Processing Standard (FIPS) 197
-
-
-
11
-
-
17544377081
-
System Architecture Directions for Networked Sensors
-
Nov.
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System Architecture Directions for Networked Sensors," in Proc. of ACM ASPLOS IX, pp. 93-104, Nov. 2000.
-
(2000)
Proc. of ACM ASPLOS IX
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
13
-
-
84949437497
-
Truncated Differentials and Skipjack
-
Springer-Verlag
-
L. R. Knudsen, M. J. B. Robshaw and D. Wagner, "Truncated Differentials and Skipjack," Lecture Notes in Computer Science 1666: Advances in Cryptology - CRYPTO'99, Springer-Verlag, pp. 790, 1999.
-
(1999)
Lecture Notes in Computer Science 1666: Advances in Cryptology - CRYPTO'99
, pp. 790
-
-
Knudsen, L.R.1
Robshaw, M.J.B.2
Wagner, D.3
|