[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … Network. Testo disponibile al sito …, 2022 - europeanleadershipnetwork.org
… ‘As a new generation of mobile communication technology, … communication is that it
subverts the traditional encryptionnetwork that is efficient, safe and concealed, as well as an …

[引用][C] AES based biometrics security solution for body area sensor networks

F Miao, L Jiang, Y Li, Y Zhang - Bulletin of Advanced Technology Research, 2009

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击INSTITUTE OF SCIENCE AND TECHNOLOGY

LOWCN IMPLEMENTATIONS - 2009 - itu.edu.tr
it is inevitable to use cryptographic algorithms in RFID and WSN systems. This work presents
a compact and low power … an effective method to decrease the dynamic power consumption…

[PDF][PDF] 无线Ad Hoc 网络最大生命周期路由算法的诚实机制

谢志鹏, 张卿 - 软件学报, 2009 - jos.org.cn
networks that a link cost is determined by two nodes together. Corsac applies efficient
cryptographic techniques … We adopt the cryptographic technique proposed in Ref.[18] to collect …

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… The blockchain-based encryption techniques are proposed by different authors to solve the
… Chen, An efficient collision power attack on AES encryption in edge computing. IEEE Access …

无线传感器网络中数据分发方法综述

郑霄龙, 万猛 - 计算机科学技术学报, 2014 - jcst.ict.ac.cn
… Since wireless communication is broadcasting and a node may hear … It also goes to sleep
state for energy saving. If … The traditional encryption algorithms are too complex to operate on …

一种数字社区的隐私保护数据收集模型

HT Li, JF Ma, S Fu - Science China Information Sciences, 2015 - Springer
… we propose a generalization-encryption method to achieve a … technology in digital community,
and wireless networks have … the trade-off between energy saving and information loss. …

TuLP: 一类面向医疗传感器网络的轻量级消息认证码

龚征, 唐韶华, 朱博 - 计算机科学技术学报, 2014 - jcst.ict.ac.cn
… time-efficient with less memory usage, but also energy-efficient in the number of gate equivalents.
… Then we derive a ciphertext guessing attack on the PRESENT block cipher as follows. …

[PDF][PDF] Ⅲ. 大学院学位論文DISSERTATIONS

電気工学専攻 - ee.tu-tokyo.ac.jp
… We show that in hybrid encryption scenario, the efficiency could be further enhanced while
… At the end of the chapter, we present a methodology for leakage power saving and at the …

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击GRADUATE SCHOOL

Y AYDIN - 2022 - polen.itu.edu.tr
… these next-generation network devices to the mobile networks with … In general, the encryption
methods are divided into two … • A fast and energy-efficient handover scheme is explained in …