Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Internet Security Protocols: Protecting IP Traffic
Internet Security Protocols: Protecting IP Traffic
SPINS: security protocols for sensor networks
Wireless Networks
WLANs and WPANs Towards 4G Wireless (Universal Personal Communications Series)
WLANs and WPANs Towards 4G Wireless (Universal Personal Communications Series)
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
IEEE Transactions on Information Theory
IEEE Communications Magazine
Light-Weight AAA Infrastructure for Mobility Support Across Heterogeneous Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
This paper presents a concept where applications are aware of security services in the low data rate (LDR) networks. Further, the paper compares the suitability of different security protocols and crypto-algorithms taking into account the security requirements and architectural issues for different LDR scenarios and finally present a new security concept ‘An Adaptive Security’ with the appropriate security protocols and crypto-algorithms for LDR networks.