[go: up one dir, main page]

Potlapally et al., 2003 - Google Patents

Analyzing the energy consumption of security protocols

Potlapally et al., 2003

View PDF
Document ID
11254135049037727610
Author
Potlapally N
Ravi S
Raghunathan A
Jha N
Publication year
Publication venue
Proceedings of the 2003 international symposium on Low power electronics and design

External Links

Snippet

Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired Internet, many new challenges arise due to the unique characteristics of battery powered …
Continue reading at cecs.uci.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Potlapally et al. Analyzing the energy consumption of security protocols
Potlapally et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols
Ravi et al. Securing wireless data: System architecture challenges
Malina et al. On perspective of security and privacy-preserving solutions in the internet of things
Roman et al. A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
Wander et al. Energy analysis of public-key cryptography for wireless sensor networks
Apostolopoulos et al. Transport Layer Security: How much does it really cost?
Argyroudis et al. Performance analysis of cryptographic protocols on handheld devices
Hirani Energy consumption of encryption schemes in wireless devices
Park et al. Computationally efficient PKI-based single sign-on protocol, PKASSO for mobile devices
Zegers et al. A lightweight encryption and secure protocol for smartphone cloud
Banerjee Energy-efficient protocols and hardware architectures for transport layer security
Shafagh Leveraging Public-key-based Authentication for the Internet of Things
Luo et al. Encryption algorithms comparisons for wireless networked sensors
Nie et al. Performance evaluation for CAST and RC5 encryption algorithms
Yilmaz et al. A two-flights mutual authentication for energy-constrained iot devices
KR100452766B1 (en) Method for cryptographing a information
Leon et al. Performance analysis of the confidentiality security service in the IEEE 802.11 using WEP, AES-CCM, and ECC
Khomlyak An investigation of lightweight cryptography and using the key derivation function for a hybrid scheme for security in IoT
Kitsos et al. UMTS security: system architecture and hardware implementation
Lim et al. Dragon-MAC: Securing wireless sensor networks with authenticated encryption
Sklavos et al. Design, architecture and performance evaluation of the wireless transport layer security
Hametvaara Certificate Management in Mobile Devices
Yunting et al. EPMDA: an efficient privacy-preserving multi-dimensional data aggregation scheme for edge computing-based IoT system
Abdulhameed et al. A lightweight hybrid cryptographic algorithm for WSN security using the Raspberry Pi as a node