-
1
-
-
0842326338
-
Encryption and Power Consumption in Wireless LANs-N
-
The Third IEEE Workshop on Wireless LANs-September 27-28, Newton, Massachusetts
-
Ruangchaijatupon, P. Krishnamurthy, "Encryption and Power Consumption in Wireless LANs-N," The Third IEEE Workshop on Wireless LANs-September 27-28, 2001- Newton, Massachusetts.
-
(2001)
-
-
Ruangchaijatupon, P.K.1
-
2
-
-
77950966955
-
Security In Wireless LANS And MANS
-
Hardjono, Artech House Publishers
-
Hardjono, "Security In Wireless LANS And MANS," Artech House Publishers 2005.
-
(2005)
-
-
-
3
-
-
0003902428
-
Cryptography and Network Security 4th Ed
-
Prentice Hall
-
W. Stallings, "Cryptography and Network Security 4th Ed," Prentice Hall, 2005, PP. 58-309.
-
(2005)
, pp. 58-309
-
-
Stallings, W.1
-
4
-
-
0028428941
-
The Data Encryption Standard (DES) and Its Strength Against Attacks
-
May
-
Coppersmith, D. "The Data Encryption Standard (DES) and Its Strength Against Attacks." IBM Journal of Research and Development, May 1994, pp. 243-250.
-
(1994)
IBM Journal of Research and Development
, pp. 243-250
-
-
Coppersmith, D.1
-
5
-
-
20444365964
-
The Blowfish Encryption Algorithm
-
Retrieved October 25
-
Bruce Schneier. The Blowfish Encryption Algorithm Retrieved October 25, 2008, http://www.schneier.com/blowfish.html
-
(2008)
-
-
Schneier, B.1
-
6
-
-
0035360456
-
Software Implementation Strategies for Power-Conscious Systems
-
K. Naik, D. S.L. Wei, Software Implementation Strategies for Power-Conscious Systems," Mobile Networks and Applications-6, 291-305, 2001.
-
(2001)
Mobile Networks and Applications
, vol.6
, pp. 291-305
-
-
Naik, K.1
Wei, D.S.L.2
-
7
-
-
0013017020
-
Rijndael: The Advanced Encryption Standard
-
March
-
Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr. Dobb's Journal, March 2001,PP. 137-139.
-
(2001)
Dr. Dobb's Journal
, pp. 137-139
-
-
Daemen, J.1
Rijmen, V.2
-
8
-
-
62749096566
-
Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms
-
Nov
-
N. El-Fishawy, "Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms", International Journal of Network Security,, Nov. 2007, PP. 241-251
-
(2007)
International Journal of Network Security
, pp. 241-251
-
-
El-Fishawy, N.1
-
9
-
-
77953153793
-
Trade-offs Between Energy and Security in Wireless Networks Thesis
-
Worcester Polytechnic Institute, April
-
K. McKay, "Trade-offs Between Energy and Security in Wireless Networks Thesis," Worcester Polytechnic Institute, April 2005.
-
(2005)
-
-
McKay, K.1
-
10
-
-
84898020796
-
Battery power-aware encryption-ACM Transactions on Information and System Security (TISSEC)
-
May
-
R. Chandramouli, "Battery power-aware encryption-ACM Transactions on Information and System Security (TISSEC)," Volume 9, Issue 2, May. 2006.
-
(2006)
, vol.9
, Issue.2
-
-
Chandramouli, R.1
-
11
-
-
4544219570
-
Energy Consumption of Encryption Schemes in Wireless Devices Thesis
-
university of Pittsburgh, April 9, Retrieved October 1, 2008, at
-
S.Hirani, "Energy Consumption of Encryption Schemes in Wireless Devices Thesis," university of Pittsburgh, April 9, 2003. Retrieved October 1, 2008, at: portal.acm.org/citation.cfm?id=383768
-
(2003)
-
-
Hirani, S.1
-
12
-
-
33847314186
-
A Performance Comparison of Data Encryption Algorithms
-
IEEE [Information and Communication Technologies, 2005. ICICT, First International Conference, 2006-02-27
-
"A Performance Comparison of Data Encryption Algorithms," IEEE [Information and Communication Technologies, 2005. ICICT 2005. First International Conference, 2006-02-27, PP. 84-89.
-
(2005)
, pp. 84-89
-
-
-
13
-
-
84898053425
-
-
Results of comparing tens of encryption algorithms using different settings- Crypto++ benchmark Retrieved October 1, from
-
Results of comparing tens of encryption algorithms using different settings- Crypto++ benchmark Retrieved October 1, 2008, from:http://www.eskimo.com/~weidai/benchmarks.html
-
(2008)
-
-
-
14
-
-
77953151750
-
Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers
-
January
-
S.Z.S. Idrus, S.A.Aljunid, S.M.Asi, "Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers," IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 1, January 2008, PP 20-25.
-
(2008)
IJCSNS International Journal of Computer Science and Network Security
, vol.8
, Issue.1
, pp. 20-25
-
-
Idrus, S.Z.S.1
Aljunid, S.A.2
Asi, S.M.3
-
15
-
-
80053202563
-
Performance Analysis of Data Encryption Algorithms
-
Retrieved October 1
-
A.A. Tamimi, "Performance Analysis of Data Encryption Algorithms. Retrieved October 1, 2008 from http://www.cs.wustl.edu/~jain/cse567-06/ftp/encryption_perf/index.html
-
(2008)
-
-
Tamimi, A.A.1
-
16
-
-
0034841273
-
A Web Based Tool for Software Energy Profiling
-
proceedings of the 38th Design, NV, as Vegas, DAC,Conference. utomation, USp
-
A. Sinha and A.P. Chandrakasan, Joule Track, "A Web Based Tool for Software Energy Profiling,," proceedings of the 38th Design, NV, as Vegas,2001 DAC,Conference. utomation, USp.p 220-225
-
(2001)
, pp. 220-225
-
-
Sinha, A.1
Chandrakasan, A.P.2
Track, J.3
|