-
1
-
-
1542376949
-
Analyzing and modeling encryption overhead for sensor network nodes
-
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, "Analyzing and modeling encryption overhead for sensor network nodes," in Wireless Sensor Networks and Applications, 2003.
-
(2003)
Wireless Sensor Networks and Applications
-
-
Ganesan, P.1
Venugopalan, R.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
2
-
-
33646918331
-
Evaluation of security mechanisms in wireless sensor networks
-
G. Guimaraes, E. Souto, D. Sadok, and J. Kelner, "Evaluation of security mechanisms in wireless sensor networks," in Systems Communications, 2005.
-
(2005)
Systems Communications
-
-
Guimaraes, G.1
Souto, E.2
Sadok, D.3
Kelner, J.4
-
4
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, J. Tygar, and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," in IEEE Symposium on Security and Privacy, April 2000.
-
IEEE Symposium on Security and Privacy, April 2000
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
5
-
-
0034771605
-
SPINS: Security suite for sensor networks
-
July
-
A. Perrig, R. Szewczyk, , V. Wen, D. Culler, and J. Tygar, "SPINS: Security suite for sensor networks," Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MOBICOM-01), pp. 189-199, July 2001.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MOBICOM-01)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
6
-
-
0003508558
-
-
U.S. DoC/NIST, Tech. Rep., November
-
"Advanced encryption standard," U.S. DoC/NIST, Tech. Rep., November 2001.
-
(2001)
Advanced Encryption Standard
-
-
-
7
-
-
77949485060
-
A chaos-based hash function with both modification detection and localization capabilities
-
D. Xiao, F. Shih, and X. Liao, "A chaos-based hash function with both modification detection and localization capabilities," Communications in Nonlinear Science and Numerical Simulation, vol. 15, pp. 2254-2261, 2010.
-
(2010)
Communications in Nonlinear Science and Numerical Simulation
, vol.15
, pp. 2254-2261
-
-
Xiao, D.1
Shih, F.2
Liao, X.3
-
8
-
-
12244258246
-
An image encryption approach based on chaotic maps
-
L. Zhang, X. Liao, and X. Wang, "An image encryption approach based on chaotic maps," Chaos, Solitons & Fractals, vol. 24, pp. 759-765, 2005.
-
(2005)
Chaos, Solitons & Fractals
, vol.24
, pp. 759-765
-
-
Zhang, L.1
Liao, X.2
Wang, X.3
-
10
-
-
0038285043
-
On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision
-
S. Li, X. Mou, Y. Cai, Z. Ji, and J. Zhang, "On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision," Computer physics communications, vol. 153, pp. 52-58, 2003.
-
(2003)
Computer Physics Communications
, vol.153
, pp. 52-58
-
-
Li, S.1
Mou, X.2
Cai, Y.3
Ji, Z.4
Zhang, J.5
-
11
-
-
81055137236
-
Enhancement of zigbee and wi-fi security by a robust and fast chaotic algorithm
-
B. Bakhache, J. Ghazal, and S. El Assad, "Enhancement of zigbee and wi-fi security by a robust and fast chaotic algorithm," in 5th International Conference on Network and System Security (NSS), 2011, pp. 300-304.
-
5th International Conference on Network and System Security (NSS), 2011
, pp. 300-304
-
-
Bakhache, B.1
Ghazal, J.2
El Assad, S.3
-
12
-
-
84861793851
-
-
Crossbow, document Part Number: 6020-0094-01 Rev B
-
Crossbow, "TelosB datasheet," document Part Number: 6020-0094-01 Rev B.
-
TelosB Datasheet
-
-
-
13
-
-
38549155648
-
-
Zigbee, ZigBee Standards Organization, Zigbee Standard 053474r17, January
-
Zigbee, "Zigbee Specification," ZigBee Standards Organization, Zigbee Standard 053474r17, January 2008.
-
(2008)
Zigbee Specification
-
-
-
17
-
-
84868137874
-
Aes implementation and performance evaluation on 8-bit microcontrollers
-
October
-
H. Lee, K. Lee, and Y. Shin, "Aes implementation and performance evaluation on 8-bit microcontrollers," International Journal of Computer Science and Information Security, vol. 6, pp. 70-74, October 2009.
-
(2009)
International Journal of Computer Science and Information Security
, vol.6
, pp. 70-74
-
-
Lee, H.1
Lee, K.2
Shin, Y.3
-
18
-
-
66449117332
-
The application of chaotic encryption in industrial control based on zigbee wireless network
-
Q. He, Q. Qi, Y. Zhao, W. Huang, and Q. Huang, "The application of chaotic encryption in industrial control based on zigbee wireless network," in 2nd international symposium on systems and control in aerospace and astronautics ISSCAA, 2008.
-
2nd International Symposium on Systems and Control in Aerospace and Astronautics ISSCAA, 2008
-
-
He, Q.1
Qi, Q.2
Zhao, Y.3
Huang, W.4
Huang, Q.5
-
19
-
-
0011285982
-
Design of one-dimensional chaotic maps with prescribed properties
-
A. Baranovsky and D. Daems, "Design of one-dimensional chaotic maps with prescribed properties," International Journal of Bifurcation and chaos, vol. 5, pp. 1585-1598, 1995.
-
(1995)
International Journal of Bifurcation and Chaos
, vol.5
, pp. 1585-1598
-
-
Baranovsky, A.1
Daems, D.2
-
20
-
-
29244491993
-
On the dynamical degradation of digital piecewise linear chaotic maps
-
S. Li, G. Chen, and X. Mou, "On the dynamical degradation of digital piecewise linear chaotic maps," International Journal of Bifurcation and Chaos, vol. 15, pp. 3119-3151, 2005.
-
(2005)
International Journal of Bifurcation and Chaos
, vol.15
, pp. 3119-3151
-
-
Li, S.1
Chen, G.2
Mou, X.3
-
22
-
-
67449096190
-
A chaos-based image encryption algorithm with variable control parameter
-
Y. Wang, K. Wong, X. Liao, X. T., and C. G., "A chaos-based image encryption algorithm with variable control parameter," Chaos, Solitons & Fractals, vol. 41, pp. 1773-1783, 2009.
-
(2009)
Chaos, Solitons & Fractals
, vol.41
, pp. 1773-1783
-
-
Wang, Y.1
Wong, K.2
Liao, X.3
T, X.4
G, C.5
|