-
1
-
-
33748300805
-
Battery poweraware encryption
-
May
-
R. Chandramouli,"Battery poweraware encryption," ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 2, pp. 162-180, May 2006.
-
(2006)
ACM Transactions on Information and System Security (TISSEC)
, vol.9
, Issue.2
, pp. 162-180
-
-
Chandramouli, R.1
-
2
-
-
0028428941
-
The data encryption standard (DES) and its strength against attacks
-
May
-
D. Coppersmith,"The data encryption standard (DES) and its strength against attacks," IBM Journal of Research and Development, pp. 243-250, May 1994.
-
(1994)
IBM Journal of Research and Development
, pp. 243-250
-
-
Coppersmith, D.1
-
3
-
-
0013017020
-
Rijndael: The advanced encryption standard
-
Mar
-
J. Daemen, and V. Rijmen,"Rijndael: The advanced encryption standard," Dr. Dobb's Journal, pp. 137-139, Mar. 2001.
-
(2001)
Dr. Dobb's Journal
, pp. 137-139
-
-
Daemen, J.1
Rijmen, V.2
-
4
-
-
80054068473
-
Central manager: A solution to avoid denial of service attacks for wreless LANs
-
P. Ding,"Central manager: A solution to avoid denial of service attacks for wreless LANs," International Journal of Network Security, vol. 4, no. 1, pp. 35-44, 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.1
, pp. 35-44
-
-
Ding, P.1
-
5
-
-
62749096566
-
Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms
-
Nov
-
N. E. Fishawy,"Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms," International Journal of Network Security, pp. 241-251, Nov. 2007.
-
(2007)
International Journal of Network Security
, pp. 241-251
-
-
Fishawy, N.E.1
-
6
-
-
84875332889
-
Security In Wireless LANS And MANS
-
Hardjono
-
Hardjono, Security In Wireless LANS And MANS, Artech House Publishers, 2005.
-
(2005)
Artech House Publishers
-
-
-
7
-
-
4544219570
-
Energy Consumption of Encryption Schemes in Wireless Devices Thesis
-
Apr. 9, Retrieved Oct. 1
-
S. Hirani, Energy Consumption of Encryption Schemes in Wireless Devices Thesis, University of Pittsburgh, Apr. 9,2003, Retrieved Oct. 1, 2008. (http://portal.acm.org/citation.cfm?id=383768)
-
(2003)
University of Pittsburgh
-
-
Hirani, S.1
-
8
-
-
33646261491
-
Authenticated encryption schemes: current status and key issues
-
M. S. Hwang and C. Y. Liu,"Authenticated encryption schemes: current status and key issues," International Journal of Network Security, vol. 1, no. 2, pp. 61-73, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 61-73
-
-
Hwang, M.S.1
Liu, C.Y.2
-
9
-
-
69749086390
-
A method for obtaining deniable publickey encryption
-
M. H. Ibrahim,"A method for obtaining deniable publickey encryption," International Journal of Network Security, vol. 8, no. 1, pp. 1-9, 2009.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.1
, pp. 1-9
-
-
Ibrahim, M.H.1
-
10
-
-
69749087308
-
Receiverdeniable publickey encryption
-
M. H. Ibrahim,"Receiverdeniable publickey encryption," International Journal of Network Security, vol. 8, no. 2, pp. 159-165, 2009.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.2
, pp. 159-165
-
-
Ibrahim, M.H.1
-
11
-
-
77953151750
-
Performance analysis of encryption algorithms text length size on web browsers
-
Jan
-
S. Z. S. Idrus, and S. A. Aljunid,"Performance analysis of encryption algorithms text length size on web browsers," IJCSNS International Journal of Computer Science and Network Security, vol. 8, no.1, pp. 20-25, Jan. 2008.
-
(2008)
IJCSNS International Journal of Computer Science and Network Security
, vol.8
, Issue.1
, pp. 20-25
-
-
Idrus, S.Z.S.1
Aljunid, S.A.2
-
12
-
-
77953153793
-
Tradeoffs between Energy and Security in Wireless Networks Thesis
-
Apr
-
K. McKay, Tradeoffs between Energy and Security in Wireless Networks Thesis, Worcester Polytechnic Institute, Apr. 2005.
-
(2005)
Worcester Polytechnic Institute
-
-
McKay, K.1
-
13
-
-
0035360456
-
Software implementation strategies for powerconscious systems
-
K. Naik,"Software implementation strategies for powerconscious systems," Mobile Networks and Applications, vol. 6, pp. 291-305, 2001.
-
(2001)
Mobile Networks and Applications
, vol.6
, pp. 291-305
-
-
Naik, K.1
-
14
-
-
0842326338
-
-
Newton, Massachusetts, Sep. 27-28
-
P. Ruangchaijatupon, and P. Krishnamurthy,"Encryption and power consumption in wireless LANsN," The Third IEEE Workshop on Wireless LANs, pp. 148-152, Newton, Massachusetts, Sep. 27-28, 2001.
-
(2001)
Encryption and power consumption in wireless LANsN, The Third IEEE Workshop on Wireless LANs
, pp. 148-152
-
-
Ruangchaijatupon, P.1
Krishnamurthy, P.2
-
16
-
-
0034841273
-
A web based tool for software energy profiling
-
DAC Las Vega, US
-
A. Sinha, A. P. Chandrakasan, and JouleTrack,"A web based tool for software energy profiling," Proceedings of the 38th Design Utomation Conference, pp. 220-225, DAC Las Vega, US, 2001.
-
(2001)
Proceedings of the 38th Design Utomation Conference
, pp. 220-225
-
-
Sinha, A.1
Chandrakasan, A.P.2
Track, J.3
-
17
-
-
0003902428
-
Cryptography and Network Security
-
Prentice Hall, 4th Ed
-
W. Stallings, Cryptography and Network Security, Prentice Hall, pp. 58-309, 4th Ed, 2005.
-
(2005)
, pp. 58-309
-
-
Stallings, W.1
|