Tài liệu tham khảo |
Loại |
Chi tiết |
[1] N.Tsiftes, Adam Dunkels, “A Database in Every Sensor”, in Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, ACM New York, NY, USA 2011, pp 316-332 |
Sách, tạp chí |
Tiêu đề: |
A Database in Every Sensor |
|
[2] W.Stallings, “CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, 5 th edition”, Pearson Education Inc, 2011 |
Sách, tạp chí |
Tiêu đề: |
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, 5th edition |
|
[3] Socrates Varakliotis, et al., “Universal Integration of the Internet of Things through an IPv6-based Service Oriented Architecture enabling heterogeneous components interoperability”, October 2011 to Septemper 2014 |
Sách, tạp chí |
Tiêu đề: |
Universal Integration of the Internet of Things through an IPv6-based Service Oriented Architecture enabling heterogeneous components interoperability |
|
[4] Erwin, “Encryption and Key Exchange in Wireless Sensor Networks”, January 2013 |
Sách, tạp chí |
Tiêu đề: |
Encryption and Key Exchange in Wireless Sensor Networks |
|
[5] Seyit A. Camtepe, Bulent Yener, “Key Distribution Mechanisms for Wireless Sensor Networks: a Survey”, Technical Report TR-05-07, Rensselaer Polytechnic Institute, Computer Science Department, Troy, NY 12180-3590, March 2005 |
Sách, tạp chí |
Tiêu đề: |
Key Distribution Mechanisms for Wireless Sensor Networks: a Survey |
|
[6] N.Gura, et al., “Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs”, in 6th International Workshop Cambridge, MA, USA, August 2004 |
Sách, tạp chí |
Tiêu đề: |
et al.", “Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs |
|
[8] G.S.Quirino, et al., “Performance Evaluation of Asymmetric Encryption Algorithms in embedded platforms used in WSNs”, in Proceedings of the International Conference on Security and Management (SAM), Athens, 2013 |
Sách, tạp chí |
Tiêu đề: |
et al.", “Performance Evaluation of Asymmetric Encryption Algorithms in embedded platforms used in WSNs |
|
[9] G.D.S.Quirino, E.D.Moreno, “ARCHITECTURAL EVALUATION OF ALGORITHMS RSA, ECC AND MQQ IN ARM PROCESSORS”, in International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013 |
Sách, tạp chí |
Tiêu đề: |
ARCHITECTURAL EVALUATION OF ALGORITHMS RSA, ECC AND MQQ IN ARM PROCESSORS |
|
[10] T. Yan, et al., “Studies on security communications of embedded devices”, in Advanced Materials Research, vol. 216, 2011, pp. 609–612 |
Sách, tạp chí |
Tiêu đề: |
et al.", “Studies on security communications of embedded devices |
|
[11] Hyubgun Lee, et al, “AES Implementation and Performance Evaluation on 8- bit Microcontrollers”, in (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, 2009 |
Sách, tạp chí |
Tiêu đề: |
et al", “AES Implementation and Performance Evaluation on 8-bit Microcontrollers |
|
[12] Abidalrahman Moh’d, et al., “A Secure Platform of Wireless Sensor Networks”, in the 2nd International Conference on Ambient Systems, Networks and Technologies, 2011 |
Sách, tạp chí |
Tiêu đề: |
et al.", “A Secure Platform of Wireless Sensor Networks |
|
[13] Shahnaz Saleem, et al., “On the Security Issues in Wireless Body Area Networks”, in Journal of Digital Content Technology and its Applications (JDCTA), 2009 |
Sách, tạp chí |
Tiêu đề: |
et al.", “On the Security Issues in Wireless Body Area Networks |
|
[14] P.D.Khambre, et al., “Secure Data in Wireless Sensor Network via AES”, in International Journal of Computer Science and Information Technologies, Vol.3, 2012, pp 3588-3592 |
Sách, tạp chí |
Tiêu đề: |
et al.", “Secure Data in Wireless Sensor Network via AES |
|
[15] Kuldeep Bhardwaj, Sanjay Chaudhary, “Implementation of Elliptic Curve Cryptography in C”, in International Journal on Emerging Technologies 3, 2012, pp 38-51 |
Sách, tạp chí |
Tiêu đề: |
Implementation of Elliptic Curve Cryptography in C |
|
[16] Bjửrn Fay, “Double-and-Add with Relative Jacobian Coordinates”, IACR Cryptology ePrint Archive, December 2014 |
Sách, tạp chí |
Tiêu đề: |
Double-and-Add with Relative Jacobian Coordinates |
|
[17] Haodong Wang, et al., “Elliptic curve cryptography-based access control in sensor networks”, International Journal of Security and Networks, Vol. 1, 2006 |
Sách, tạp chí |
Tiêu đề: |
et al.", “Elliptic curve cryptography-based access control in sensor networks |
|
[18] Dhanashri H. Gawali1, Vijay M. Wadhai, “RC5 ALGORITHM: POTENTIAL CIPHER SOLUTION FOR SECURITY IN WIRELESS BODY SENSOR NETWORKS (WBSN)”, International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 2, No.3, July 2012 |
Sách, tạp chí |
Tiêu đề: |
RC5 ALGORITHM: POTENTIAL CIPHER SOLUTION FOR SECURITY IN WIRELESS BODY SENSOR NETWORKS (WBSN) |
|
[19] Bharat Singh, et al., “Sensor Data Encryption Protocol for Wireless Network Security”, Global Journal of Computer Science and Technology, Vol 12, April 2012 |
Sách, tạp chí |
Tiêu đề: |
et al.", “Sensor Data Encryption Protocol for Wireless Network Security |
|
[20] Certicom Research, “SEC 2: Recommended Elliptic Curve Domain Parameters”, January 2010 |
Sách, tạp chí |
Tiêu đề: |
SEC 2: Recommended Elliptic Curve Domain Parameters |
|
[21] David Brumley, Dan Boneh, “Remote Timing Attacks are Practical”, in proceedings of the 12th Usenix Security Symposium, 2003 |
Sách, tạp chí |
Tiêu đề: |
Remote Timing Attacks are Practical |
|