Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Digital Signatures for Flows and Multicasts
ICNP '98 Proceedings of the Sixth International Conference on Network Protocols
Secrecy, authentication, and public key systems.
Secrecy, authentication, and public key systems.
Energy-aware lossless data compression
ACM Transactions on Computer Systems (TOCS)
Interference analysis and transmit power control in IEEE 802.11a/h wireless LANs
IEEE/ACM Transactions on Networking (TON)
Improving IEEE 802.11 power saving mechanism
Wireless Networks
High-Speed Elliptic Curve Cryptography Accelerator for Koblitz Curves
FCCM '08 Proceedings of the 2008 16th International Symposium on Field-Programmable Custom Computing Machines
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
SP 800-57. Recommendation for Key Management, Part 1: General (revised)
SP 800-57. Recommendation for Key Management, Part 1: General (revised)
Differential properties of elliptic curves and blind signatures
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |
Several security solutions have been proposed for wireless networks, most of these are based on lightweight security measures and contain significant drawbacks, such as transit path dependency and high bandwidth overhead. In this work we compare a Packet Level Authentication (PLA), which is a public key based solution, against hash tree and hash chain based solutions in terms of security and energy overhead in wireless environment. We argue that due to advances in the semiconductor technology, public key based security solutions are viable for wireless networks. In many cases they actually achieve a better energy efficiency due to their lower bandwidth overhead.