Search Results

There are 3921 results for: content related to: Design and implementation of a versatile cryptographic unit for RISC processors

  1. Energy efficiency of encryption schemes applied to wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 789–808, Xueying Zhang, Howard M. Heys and Cheng Li

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.375

  2. Embedded Systems Security: A Survey of EU Research Efforts

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2016–2036, Charalampos Manifavas, Konstantinos Fysarakis, Alexandros Papanikolaou and Ioannis Papaefstathiou

    Version of Record online : 23 DEC 2014, DOI: 10.1002/sec.1151

  3. Comprehensive analysis of the authentication methods in wireless body area networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4777–4803, Mohammad Masdari and Safiyeh Ahmadzadeh

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1642

  4. Fusion: coalesced confidential storage and communication framework for the IoT

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2656–2673, Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig and Thiemo Voigt

    Version of Record online : 30 APR 2015, DOI: 10.1002/sec.1260

  5. User-centric secure integration of personal RFID tags and sensor networks

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1177–1197, Pablo Najera, Rodrigo Roman and Javier Lopez

    Version of Record online : 19 FEB 2013, DOI: 10.1002/sec.684

  6. A survey of lightweight stream ciphers for embedded systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1226–1246, Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis and Yannis Papaefstathiou

    Version of Record online : 21 DEC 2015, DOI: 10.1002/sec.1399

  7. Secure Communication with RFID tags in the Internet of Things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2639–2653, Sandra Dominikus and Stefan Kraxberger

    Version of Record online : 22 NOV 2011, DOI: 10.1002/sec.398

  8. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1079

  9. Privacy-preserving framework for geosocial applications

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1764–1779, Lukas Malina and Jan Hajny

    Version of Record online : 31 AUG 2013, DOI: 10.1002/sec.873

  10. RIAPPA: a Robust Identity Assignment Protocol for P2P overlays

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2743–2760, Juan Caubet, Oscar Esparza, José L. Muñoz, Juanjo Alins and Jorge Mata-Díaz

    Version of Record online : 20 FEB 2014, DOI: 10.1002/sec.956

  11. Secure cryptographic functions via virtualization-based outsourced computing

    Concurrency and Computation: Practice and Experience

    Volume 28, Issue 11, 10 August 2016, Pages: 3149–3163, Weizhong Qiang, Kang Zhang, Weiqi Dai and Hai Jin

    Version of Record online : 7 OCT 2015, DOI: 10.1002/cpe.3706

  12. Attribute-based credentials with cryptographic collusion prevention

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3836–3846, Jan Hajny, Petr Dzurenda and Lukas Malina

    Version of Record online : 7 JUL 2015, DOI: 10.1002/sec.1304

  13. Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2654–2668, Shahid Raza, Simon Duquennoy, Joel Höglund, Utz Roedig and Thiemo Voigt

    Version of Record online : 18 JAN 2012, DOI: 10.1002/sec.406

  14. A limitation on security evaluation of cryptographic primitives with fixed keys

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1663–1675, Yutaka Kawai, Goichiro Hanaoka, Kazuo Ohta and Noboru Kunihiro

    Version of Record online : 24 FEB 2016, DOI: 10.1002/sec.1457

  15. Non-singular sequence folding-based pseudorandom key generation algorithm for cryptographic processor

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4019–4027, K. K. Soundra Pandian and Kailash Chandra Ray

    Version of Record online : 24 JUL 2015, DOI: 10.1002/sec.1318

  16. An architecture for secure mobile devices

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1958–1970, René Mayrhofer

    Version of Record online : 17 JUN 2014, DOI: 10.1002/sec.1028

  17. Collaborative agglomerative document clustering with limited information disclosure

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: 964–978, Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi and Kouichi Sakurai

    Version of Record online : 14 JUN 2013, DOI: 10.1002/sec.811

  18. Certificateless broadcast authentication for vehicular ad hoc networks

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 602–611, Eun-Kyung Ryu and Kee-Young Yoo

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.590

  19. Protocol Derivation System for the Needham–Schroeder family

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2687–2703, Junwei Zhang, Jianfeng Ma and Chao Yang

    Version of Record online : 25 JUN 2012, DOI: 10.1002/sec.565

  20. Generating certification authority authenticated public keys in ad hoc networks

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 87–106, G. Kounga, C. J. Mitchell and T. Walter

    Version of Record online : 13 DEC 2010, DOI: 10.1002/sec.279