Energy Comparison of AES and SHA-1 for Ubiquitous Computing

Wireless sensor networks and Radio Frequency Identifiers are becoming mainstream applications of ubiquitous computing. They are slowly being integrated into our infrastructure and therefore must incorporate a certain level of security. However, both applications are severely resource constrained. En...

Full description

Saved in:
Bibliographic Details
Published inEmerging Directions in Embedded and Ubiquitous Computing pp. 372 - 381
Main Authors Kaps, Jens-Peter, Sunar, Berk
Format Book Chapter Conference Proceeding
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2006
Springer
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…