First Page | Meta Content | |
---|---|---|
![]() | Document Date: 2006-02-19 14:19:02Open Document File Size: 340,97 KBShare Result on FacebookCityToronto / San Jose / Athens / San Diego / /CompanyCRC Press / the AES / John Wiley & Sons Inc. / Assessing Security-Critical Energy-Efficient Sensor Networks / Las Vegas NV / Power-Conscious Systems / Information Exchange Between Systems / IEEE / Intel / /CountryCanada / United States / Greece / /CurrencyUSD / pence / / /EventFDA Phase / /FacilityP. Krishnamurthy Telecommunications Program University of Pittsburgh Pittsburgh / Prentice Hall / /IndustryTerm486DX2 processor / Wireless Medium Access Control / Web Based Tool / Wireless Information Architecture / energy efficient security protocols / wireless link / ad hoc networking environment / energy / energy efficient communications protocols / energy consumption / sensor networks / Wireless Sessions / energy efficient communication protocols / wireless device / energy consumption benchmark / less energy / energy efficiency / wireless sniffer / wireless transmission / security protocols / light encryption algorithm / compression algorithm / handheld device / energy efficient technique / symmetric key algorithms / Wireless Clients / wireless channel errors / low processing power / Wireless Devices Many encryption algorithms / Wireless LAN Medium Access Control / transmission protocols / congestion control algorithm / wireless networks / hybrid security protocol / times less energy / communications protocols / energy cost / wireless network interface / security services / energy efficient security scheme / encryption algorithms / wireless local area networks / wireless handheld devices / Wireless LANs / large communication networks / encryption algorithm / wireless devices / Wireless Transport Layer Security / /OrganizationWireless LANs P. Prasithsangaree and P. Krishnamurthy Telecommunications Program University of Pittsburgh Pittsburgh / International Criminal Court / /PersonJoan Daemen / Ron Rivest / Vincent Rijmen / / /ProductRC4 / /ProgrammingLanguageJoule / /ProvinceOrStateCalifornia / /PublishedMediumJournal of Cryptology / Lecture Notes in Computer Science / /Technologysymmetric key encryption / TCP protocol / RC4 algorithm / RAM / asymmetric key encryption / Encryption algorithms / encryption algorithm / communications protocols / two symmetric key algorithms / smart card / security protocols / I. INTRODUCTION Encryption algorithms / transmission protocols / BACKGROUND AND RELATED WORK A. Encryption / public key encryption / encryption / Cryptography / congestion control algorithm / RC4 algorithms / compression algorithm / wireless device / WEP protocol / light encryption algorithm / secret key encryption / 486DX2 processor / LAN / WEP / 802.11 MAC protocol / wireless devices / 300 A. Encryption / MTU / hybrid security protocol / SSL / key Blowfish algorithm / key scheduling algorithm / SSL protocol / communication protocols / local area networks / embedded processor / wireless LAN / /URLhttp /SocialTag |