Author:
Tsouri Gill R.,Wulich Dov
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference53 articles.
1. Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978, 21(2):120-126. 10.1145/359340.359342
2. U.S. National Bureau of Standards (NBS) : Data Encryption Standard. Federal Information Processing Standards Publication 46 (FIPS-46), 1977
3. Simon MK, Omura JK, Scholtz RA, Levitt BK: Spread Spectrum Communications Handbook. McGraw-Hill, New York, NY, USA; 2002.
4. Diffie W, Hellman ME: New directions in cryptography. IEEE Transactions on Information Theory 1976, 22(6):644-654. 10.1109/TIT.1976.1055638
5. Potlapally NR, Ravi S, Raghunathan A, Jha NK: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing 2006, 5(2):128-143.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献