Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limita...
Main Authors: | Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said |
---|---|
Format: | Proceeding Paper |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/15398/1/Comparison_between_RSA_hardware_and_software_implementation_for_WSNs_sexcurity_schemes.pdf |
Similar Items
-
Energy consumption evaluation in trust and reputation models for wireless sensor networks
by: Alkalbani, Abdullah Said, et al.
Published: (2013) -
Attacks on weak implementations of RSA
by: Kok, Zi Ming
Published: (2021) -
Weak implementation of RSA algorithm
by: Lim, Si Yi
Published: (2023) -
Implementation Of Hardware Software Partitioning In Embedded System
by: Mohd Nor, Masyirah
Published: (2018) -
Comparison of ECC and RSA algorithms in IOT devices
by: Vahdati, Zeinab, et al.
Published: (2019)