[1]
|
Whiting, D., Housley, R. and Ferguson, N. (2003) Counter with CBC-MAC (CCM).
|
[2]
|
Lei, J., et al. (2007) Comparative Studies on Authentication and Key Exchange Methods for 802.11 Wireless LAN. Computers & Security, 26, 401-409. http://dx.doi.org/10.1016/j.cose.2007.01.001
|
[3]
|
Rogaway, P. (2011) Evaluation of Some Block Cipher Modes of Operation. Technical Report, Cryptography Research and Evaluation Committees (CRYPTREC).
|
[4]
|
IEEE Inc. (2003) IEEE 802.15.3 Working Group—Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPAN). IEEE Draft Standard.
|
[5]
|
Yüksel, E., Nielson, H.R. and Nielson, F. (2008) ZigBee-2007 Security Essentials. Proceedings of 13th Nordic Workshop on Secure IT-Systems, 65-82.
|
[6]
|
Dworkin, M. (2001) Recommendation for Block Cipher Modes of Operation. Methods and Techniques. DTIC Document.
|
[7]
|
Ehrsam, W.F., et al. (1978) Message Verification and Transmission Error Detection by Block Chaining. Google Patents.
|
[8]
|
Al-Alak, S., et al. (2013) Randomness Improvement of AES Using MKP. Research Journal of Information Technology, 5, 24-34. http://dx.doi.org/10.3923/rjit.2013.24.34
|
[9]
|
Al-Alak, S., et al. (2012) Authentication Time of IEEE 802.15.4 with Multiple-Key Protocol Using Distributed Message Authentication Code Algorithm. Research Journal of Information Technology, 4, 140-154. http://dx.doi.org/10.3923/rjit.2012.140.154
|
[10]
|
Standard, N. (1999) Data Encryption Standard (DES). Federal Information Processing Standards Publication.
|
[11]
|
Schneier, B. (1993) The Idea Encryption Algorithm-The International Data Encryption Algorithm (IDEA) May Be One of the Most Secure Block Algorithms Available to the Public Today. Bruce Examines Its 128-Bit-Long Key. Dr Dobb’s Journal-Software Tools for the Professional Programmer, 18, 50-57.
|
[12]
|
Rivest, R. (1995) The RC5 Encryption Algorithm. Springer, Berlin.
|
[13]
|
Schneier, B. (1994) The Blowfish Encryption Algorithm. Dr Dobb’s Journal-Software Tools for the Professional Programmer, 19, 38-43.
|
[14]
|
Fips, N. (2001) 197: Announcing the Advanced Encryption Standard (AES). Information Technology Laboratory, National Institute of Standards and Technology.
|
[15]
|
Aladdin, K.S.L. (2000) The Enduring Value of Symmetric Encryption. White Paper.
|
[16]
|
Koblitz, N. (1987) Elliptic Curve Cryptosystems. Mathematics of Computation, 48, 203-209. http://dx.doi.org/10.1090/S0025-5718-1987-0866109-5
|
[17]
|
Vanstone, S.A. (2003) Next Generation Security for Wireless: Elliptic Curve Cryptography. Computers & Security, 22, 412-415. http://dx.doi.org/10.1016/S0167-4048(03)00507-8
|
[18]
|
Kirlar, B.B. (2011) On the Elliptic Curves y2 = x3 - c with Embedding Degree One. Journal of Computational and applied Mathematics, 235, 4724-4728. http://dx.doi.org/10.1016/j.cam.2010.08.020
|
[19]
|
Edoh, K.D. (2004) Elliptic Curve Cryptography: Java Implementation. Proceedings of the 1st Annual Conference on Information Security Curriculum Development, Kennesaw, 8 October 2004, 88-93. http://dx.doi.org/10.1145/1059524.1059542
|
[20]
|
LAN/MAN, S.C. (2006) IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements--Part 15.4: Wireless MAC and PHY Specifications for Low-Rate WPANs. Control, 1-203.
|
[21]
|
Qianqian, M. and Kejin, B. (2009) Security Analysis for Wireless Networks Based on ZigBee. International Forum on Information Technology and Applications, Chengdu, 15-17 May 2009, 158-160.
|