-
1
-
-
67249152204
-
Improving network performance in hybrid wireless networks using a satellite overlay
-
September 2007 Turin, Italy Instituto Internazionale Delle Comunicazioni (IIC)
-
Roy-Chowdhury A., Baras J. S., Improving network performance in hybrid wireless networks using a satellite overlay Proceedings of the 13th Ka and Broadband Communications Conference September 2007 Turin, Italy Instituto Internazionale delle Comunicazioni (IIC)
-
Proceedings of the 13th Ka and Broadband Communications Conference
-
-
Roy-Chowdhury, A.1
Baras, J.S.2
-
2
-
-
0003508564
-
-
National Institute Of Standards And Technology (NIST) Gaithersburg, Md, USA NIST Information Technology Laboratory, FIPS 186-3
-
National Institute of Standards and Technology (NIST), Digital signature standard (DSS) March 2006 FIPS 186-3 Gaithersburg, Md, USA NIST Information Technology Laboratory
-
(2006)
Digital signature standard (DSS)
-
-
-
3
-
-
0036980311
-
Performance analysis of elliptic curve cryptography for SSL
-
September 2002 Atlanta, Ga, USA ACM
-
Gupta V., Gupta S., Chang S., Stebila D., Performance analysis of elliptic curve cryptography for SSL Proceedings of the ACM Wireless Internet Security Workshop (WiSe '02) September 2002 Atlanta, Ga, USA ACM 87 94
-
Proceedings of the ACM Wireless Internet Security Workshop (WiSe '02)
, pp. 87-94
-
-
Gupta, V.1
Gupta, S.2
Chang, S.3
Stebila, D.4
-
4
-
-
4544315117
-
On a framework for energy-efficient security protocols in wireless networks
-
Prasithsangaree P., Krishnamurthy P., On a framework for energy-efficient security protocols in wireless networks Computer Communications 2004 27 17 1716 1729
-
(2004)
Computer Communications
, vol.27
, Issue.17
, pp. 1716-1729
-
-
Prasithsangaree, P.1
Krishnamurthy, P.2
-
5
-
-
33746881477
-
Power consumption evaluation of efficient digital signature schemes for low power devices
-
2005 IEEE
-
Seys S., Preneel B., Power consumption evaluation of efficient digital signature schemes for low power devices 1 Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, (WiMob '05) 2005 IEEE 79 86
-
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, (WiMob '05)
, vol.1
, pp. 79-86
-
-
Seys, S.1
Preneel, B.2
-
6
-
-
0033336340
-
Experimental analysis of cryptographic overhead in performance-critical systems
-
October, College Park, Md, USA
-
Freeman W., Miller E., Experimental analysis of cryptographic overhead in performance-critical systems Proceedings of the IEEE International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOT '99) October 1999 College Park, Md, USA 348 357
-
(1999)
Proceedings of the IEEE International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOT '99)
, pp. 348-357
-
-
Freeman, W.1
Miller, E.2
-
7
-
-
79251648808
-
Twirl and RSA key size
-
Bedford, Mass, USA RSA Laboratories
-
Kaliski B., Twirl and RSA key size CryptoBytes Technical Newsletter 2003 Bedford, Mass, USA RSA Laboratories
-
(2003)
CryptoBytes Technical Newsletter
-
-
Kaliski, B.1
-
9
-
-
67249118578
-
A lightweight certificate-based source authentication protocol for group communication in hybrid wireless/satellite networks
-
December 2008 New Orleans, La, USA IEEE
-
Roy-Chowdhury A., Baras J. S., A lightweight certificate-based source authentication protocol for group communication in hybrid wireless/satellite networks Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08) December 2008 New Orleans, La, USA IEEE 1897 1902
-
Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08)
, pp. 1897-1902
-
-
Roy-Chowdhury, A.1
Baras, J.S.2
-
10
-
-
79251605966
-
Probabilistic non-repudiation for source authentication with TESLA certificates in hybrid satellite/wireless networks and performance analysis of the authentication protocol
-
September 2009 Cagliari, Italy Italian Space Agency
-
Roy-Chowdhury A., Baras J. S., Probabilistic non-repudiation for source authentication with TESLA certificates in hybrid satellite/wireless networks and performance analysis of the authentication protocol Proceedings of the 15th Ka and Broadband Communications Navigation and Earth Observation Conference September 2009 Cagliari, Italy Italian Space Agency
-
Proceedings of the 15th Ka and Broadband Communications Navigation and Earth Observation Conference
-
-
Roy-Chowdhury, A.1
Baras, J.S.2
-
11
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
March 1999
-
Canetti R., Garay J., Itkis G., Micciancio D., Naor M., Pinkas B., Multicast security: a taxonomy and some efficient constructions Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societie (INFOCOM '99) March 1999 708 716
-
Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societie (INFOCOM '99)
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
12
-
-
84889351757
-
How to sign digital signatures
-
Berlin, Germany Springer
-
Gennaro R., Rohatgi P., How to sign digital signatures Advances in CryptologyCRYPTO 1997 Berlin, Germany Springer 180 197
-
(1997)
Advances in CryptologyCRYPTO
, pp. 180-197
-
-
Gennaro, R.1
Rohatgi, P.2
-
15
-
-
0001989185
-
A new family of authentication protocols
-
Anderson R., Bergadano F., Crispo B., Lee J.-H., Manifavas C., Needham R., A new family of authentication protocols Operating Systems Review (ACM) 1998 32 4 9 20
-
(1998)
Operating Systems Review (ACM)
, vol.32
, Issue.4
, pp. 9-20
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.-H.4
Manifavas, C.5
Needham, R.6
-
17
-
-
0242426103
-
TheTESLA broadcast authentication protocol
-
Perrig A., Canetti R., Song D., Tygar J. D., TheTESLA broadcast authentication protocol RSA CryptoBytes 2002 5 2 2 13
-
(2002)
RSA CryptoBytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
19
-
-
1542317846
-
An authentication framework for hierarchical ad hoc sensor networks
-
August, San Diego, Calif, USA ACM
-
Bohge M., Trappe W., An authentication framework for hierarchical ad hoc sensor networks Proceedings of the ACM Workshop on Wireless Security (WiSE '03) August 2003 San Diego, Calif, USA ACM 79 87
-
(2003)
Proceedings of the ACM Workshop on Wireless Security (WiSE '03)
, pp. 79-87
-
-
Bohge, M.1
Trappe, W.2
-
26
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Potlapally N. R., Ravi S., Raghunathan A., Jha N. K., A study of the energy consumption characteristics of cryptographic algorithms and security protocols IEEE Transactions on Mobile Computing 2006 5 2 128 143
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
|