Socio-Technical Design of Ubiquitous Computing Systems 2014
DOI: 10.1007/978-3-319-05044-7_9
|View full text |Cite
|
Sign up to set email alerts
|

Ranking Cryptographic Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Throughput has been measured from post‐route simulation of ISIM environment. The parameter security is measured with the help of [8]. The offline power, throughput, resource, and security data is stored in the three‐dimensional matrix and are added as a header file of the preferential algorithm executed by PE1.…”
Section: Implementation and Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…Throughput has been measured from post‐route simulation of ISIM environment. The parameter security is measured with the help of [8]. The offline power, throughput, resource, and security data is stored in the three‐dimensional matrix and are added as a header file of the preferential algorithm executed by PE1.…”
Section: Implementation and Resultsmentioning
confidence: 99%
“…Formulation of new ESI: Here, we propose an automated preferential algorithm which introduces a new ESI to meet the multi-metric budget consisting of resource, power, and throughput and security on SSL cipher suite. The security parameter S is defined by [8]…”
Section: Security-aware Esi Incorporating Hardware Variancementioning
confidence: 99%
See 3 more Smart Citations