Potlapally et al., 2003 - Google Patents
Analyzing the energy consumption of security protocolsPotlapally et al., 2003
View PDF- Document ID
- 11254135049037727610
- Author
- Potlapally N
- Ravi S
- Raghunathan A
- Jha N
- Publication year
- Publication venue
- Proceedings of the 2003 international symposium on Low power electronics and design
External Links
Snippet
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired Internet, many new challenges arise due to the unique characteristics of battery powered …
- 238000005265 energy consumption 0 title abstract description 57
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Potlapally et al. | Analyzing the energy consumption of security protocols | |
| Potlapally et al. | A study of the energy consumption characteristics of cryptographic algorithms and security protocols | |
| Ravi et al. | Securing wireless data: System architecture challenges | |
| Malina et al. | On perspective of security and privacy-preserving solutions in the internet of things | |
| Roman et al. | A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes | |
| Wander et al. | Energy analysis of public-key cryptography for wireless sensor networks | |
| Apostolopoulos et al. | Transport Layer Security: How much does it really cost? | |
| Argyroudis et al. | Performance analysis of cryptographic protocols on handheld devices | |
| Hirani | Energy consumption of encryption schemes in wireless devices | |
| Park et al. | Computationally efficient PKI-based single sign-on protocol, PKASSO for mobile devices | |
| Zegers et al. | A lightweight encryption and secure protocol for smartphone cloud | |
| Banerjee | Energy-efficient protocols and hardware architectures for transport layer security | |
| Shafagh | Leveraging Public-key-based Authentication for the Internet of Things | |
| Luo et al. | Encryption algorithms comparisons for wireless networked sensors | |
| Nie et al. | Performance evaluation for CAST and RC5 encryption algorithms | |
| Yilmaz et al. | A two-flights mutual authentication for energy-constrained iot devices | |
| KR100452766B1 (en) | Method for cryptographing a information | |
| Leon et al. | Performance analysis of the confidentiality security service in the IEEE 802.11 using WEP, AES-CCM, and ECC | |
| Khomlyak | An investigation of lightweight cryptography and using the key derivation function for a hybrid scheme for security in IoT | |
| Kitsos et al. | UMTS security: system architecture and hardware implementation | |
| Lim et al. | Dragon-MAC: Securing wireless sensor networks with authenticated encryption | |
| Sklavos et al. | Design, architecture and performance evaluation of the wireless transport layer security | |
| Hametvaara | Certificate Management in Mobile Devices | |
| Yunting et al. | EPMDA: an efficient privacy-preserving multi-dimensional data aggregation scheme for edge computing-based IoT system | |
| Abdulhameed et al. | A lightweight hybrid cryptographic algorithm for WSN security using the Raspberry Pi as a node |