Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limita...
Saved in:
Main Authors: | Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/15398/1/Comparison_between_RSA_hardware_and_software_implementation_for_WSNs_sexcurity_schemes.pdf http://irep.iium.edu.my/15398/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
RSA with flexible key size: a hardware approach
by: Asaduzzaman, Khandaker, et al.
Published: (2005) -
Implementation of RSA algorithm
by: Rasid, Hafizul Azizi, et al.
Published: (2011) -
Congestion-aware and traffic load balancing scheme for routing in WSNs
by: Chughtai, O., et al.
Published: (2016) -
Congestion-aware and traffic load balancing scheme for routing in WSNs
by: Chughtai, O., et al.
Published: (2016) -
Congestion-aware and traffic load balancing scheme for routing in WSNs
by: Chughtai, O., et al.
Published: (2016)