Secure communications in distributed embedded systems (original) (raw)

Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper

vipul gupta

2005

View PDFchevron_right

Sizzle: A standards-based end-to-end security architecture for the embedded internet

Gokul Vanchinathan

Pervasive and Mobile …, 2005

View PDFchevron_right

Implementation of Secured Embedded Web server on FPGA

JASH MATHEW

View PDFchevron_right

Network Security in Embedded System Using TLS

archana singh

View PDFchevron_right

Secure Communications in Embedded Systems

Andreas Steffen

CRC Industrial Information Technology …, 2004

View PDFchevron_right

A SECURITY FRAMEWORK FOR ETHERNET BASED EMBEDDED WEB SERVER

Valli Vatsavayi, Dr. Ravi Kiran Varma P

View PDFchevron_right

A Review on Elliptic Curve Cryptography for Embedded Systems

Rahat Siddiqui

arXiv preprint arXiv:1107.3631, 2011

View PDFchevron_right

A HTTP-enabled cryptographically secure hardware random number generator

Aleksander Radovan

2013 36th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2013

View PDFchevron_right

An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices

Mohd Anuar Mat Isa

View PDFchevron_right

Embedded Web Server with Data Security for Wireless Sensor Networks

IJSRP Journal

View PDFchevron_right

Cryptographic Hardware and Embedded Systems - CHES 2004

Jean-jacques Quisquater

Lecture Notes in Computer Science, 2004

View PDFchevron_right

A Lightweight Authentication and Encryption Protocol for Secure Communications Between Resource-Limited Devices Without Hardware Modification

William Farrelly

Research Anthology on Artificial Intelligence Applications in Security, 2021

View PDFchevron_right

Embedded Systems Security Challenges

Konstantinos Rantos

View PDFchevron_right

Implementing the TLS Protocol on a Bare PC

ali emdadi

2010 Second International Conference on Computer Research and Development, 2010

View PDFchevron_right

On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks

Thomas Newe

View PDFchevron_right

Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the El …

Konstantinos Chalkias

V International Enformatika …, 2005

View PDFchevron_right

Performance Analysis of Elliptic Curve Cryptography in Secure Socket Layer & Wireless Security

vipul Gupta

metronu.ulb.ac.be

View PDFchevron_right

Implementing identity-based key agreement in embedded devices

Giovanni Schmid

2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS), 2015

View PDFchevron_right

A Novel Architecture for Secure Communications in Mobile Systems

Jajati Sahoo

View PDFchevron_right

A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks

William Farrelly

International Journal of Information Security and Privacy, 2014

View PDFchevron_right

Secure communication between lightweight computing devices over the internet

Patrick Dymond

… , 2002. HICSS. Proceedings of the 35th …, 2002

View PDFchevron_right

The Performance of TLS Protocol in Vehicular Embedded Computers

Isack Jackson

2016

View PDFchevron_right

A new generic 3-step protocol for authentication and key agreement in embedded systems

Olivier Markowitch

2009

View PDFchevron_right

Hardware-Software Implementation of Public-Key Cryptography for Wireless Sensor Networks

Emanuel Popovici

Irish Signals and …, 2006

View PDFchevron_right

A workload characterization of elliptic curve cryptography methods in embedded environments

Roberto Giorgi

Proceedings of the 2003 Workshop on MEmory Performance: DEaling with Applications, Systems and Architecture, MEDEA '03, 2003

View PDFchevron_right

Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks

Michael Kruger

Lecture Notes in Computer Science, 2008

View PDFchevron_right