-
1
-
-
84865625980
-
Internet of things
-
F. Xia, L. T. Yang, L. Wang, and A. Vinel, "Internet of things," International Journal of Communication Systems, vol. 25, no. 9, p. 1101, 2012.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.9
, pp. 1101
-
-
Xia, F.1
Yang, L.T.2
Wang, L.3
Vinel, A.4
-
2
-
-
85010371544
-
-
[Accessed 6 January 2014]
-
A. Cortex, "a9 processor," URL: http://www. arm. com/products/processors/cortex-a/cortex-a9. php.[Accessed 6 January 2014], 2011.
-
(2011)
A9 Processor
-
-
Cortex, A.1
-
3
-
-
85044796475
-
Security in the age of networks
-
B. Dupont, "Security in the age of networks," Policing and society, vol. 14, no. 1, pp. 76-91, 2004.
-
(2004)
Policing and Society
, vol.14
, Issue.1
, pp. 76-91
-
-
Dupont, B.1
-
5
-
-
84875784661
-
A comparative survey on symmetric key encryption techniques
-
M. Agrawal and P. Mishra, "A comparative survey on symmetric key encryption techniques," International Journal on Computer Science and Engineering, vol. 4, no. 5, p. 877, 2012.
-
(2012)
International Journal on Computer Science and Engineering
, vol.4
, Issue.5
, pp. 877
-
-
Agrawal, M.1
Mishra, P.2
-
6
-
-
68949216895
-
Practical symmetric key cryptography on modern graphics hardware
-
O. Harrison and J. Waldron, "Practical symmetric key cryptography on modern graphics hardware." in USENIX Security Symposium, 2008, pp. 195-210.
-
(2008)
USENIX Security Symposium
, pp. 195-210
-
-
Harrison, O.1
Waldron, J.2
-
7
-
-
77950845925
-
Symmetric cryptography in javascript
-
E. Stark, M. Hamburg, and D. Boneh, "Symmetric cryptography in javascript," in Computer Security Applications Conference, 2009. ACSAC' 09. Annual. IEEE, 2009, pp. 373-381.
-
(2009)
Computer Security Applications Conference, 2009. ACSAC' 09. Annual. IEEE
, pp. 373-381
-
-
Stark, E.1
Hamburg, M.2
Boneh, D.3
-
8
-
-
37149018890
-
A survey of lightweight-cryptography implementations
-
T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel, "A survey of lightweight-cryptography implementations," IEEE Design & Test of Computers, vol. 24, no. 6, pp. 522-533, 2007.
-
(2007)
IEEE Design & Test of Computers
, vol.24
, Issue.6
, pp. 522-533
-
-
Eisenbarth, T.1
Kumar, S.2
Paar, C.3
Poschmann, A.4
Uhsadel, L.5
-
12
-
-
85010437317
-
Implementation of embedded aes encryption algorithm in hardware [j]
-
N. Feng, H. Zhang, Y. Lu, and W. Liu, "Implementation of embedded aes encryption algorithm in hardware [j]," Video Engineering, vol. 3, p. 018, 2013.
-
(2013)
Video Engineering
, vol.3
, pp. 018
-
-
Feng, N.1
Zhang, H.2
Lu, Y.3
Liu, W.4
-
13
-
-
84868310586
-
Improving the throughput of the aes algorithm with multicore processors
-
A. Barnes, R. Fernando, K. Mettananda, and R. Ragel, "Improving the throughput of the aes algorithm with multicore processors," in 2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2012, pp. 1-6.
-
(2012)
2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS). IEEE
, pp. 1-6
-
-
Barnes, A.1
Fernando, R.2
Mettananda, K.3
Ragel, R.4
-
14
-
-
84885597300
-
Comparison of hardware and software based encryption for secure communication in wireless sensor networks
-
M. Botta, M. Simek, and N. Mitton, "Comparison of hardware and software based encryption for secure communication in wireless sensor networks," in Telecommunications and Signal Processing (TSP), 2013 36th International Conference on. IEEE, 2013, pp. 6-10.
-
(2013)
Telecommunications and Signal Processing (TSP), 2013 36th International Conference On. IEEE
, pp. 6-10
-
-
Botta, M.1
Simek, M.2
Mitton, N.3
-
15
-
-
84885231013
-
A-soft-aes: Self-adaptive software-implemented fault-tolerance for aes
-
F. Oboril, I. Sagar, and M. B. Tahoori, "A-soft-aes: Self-adaptive software-implemented fault-tolerance for aes," in 2013 IEEE 19th International On-Line Testing Symposium (IOLTS). IEEE, 2013, pp. 104-109.
-
(2013)
2013 IEEE 19th International On-Line Testing Symposium (IOLTS). IEEE
, pp. 104-109
-
-
Oboril, F.1
Sagar, I.2
Tahoori, M.B.3
-
17
-
-
3042545730
-
The aes-cbc cipher algorithm and its use with ipsec
-
S. Frankel, R. Glenn, and S. Kelly, "The aes-cbc cipher algorithm and its use with ipsec," Tech. Rep., 2003.
-
(2003)
Tech. Rep
-
-
Frankel, S.1
Glenn, R.2
Kelly, S.3
-
21
-
-
84944896938
-
An ASIC implementation of the aes sboxes
-
Springer
-
J. Wolkerstorfer, E. Oswald, and M. Lamberger, "An asic implementation of the aes sboxes," in Cryptographers Track at the RSA Conference. Springer, 2002, pp. 67-78.
-
(2002)
Cryptographers Track at the RSA Conference
, pp. 67-78
-
-
Wolkerstorfer, J.1
Oswald, E.2
Lamberger, M.3
-
22
-
-
85010322278
-
Protocol version: 2.0 specification
-
A. AMBA, "Protocol version: 2.0 specification," ARM Ltd, pp. 1-1, 2010.
-
(2010)
ARM Ltd
, pp. 1
-
-
Amba, A.1
|