Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security

M. Razvi Doomun, K. M. S. Soyjaudah. Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security. I. J. Network Security, 9(1):82-94, 2009. [doi]

@article{DoomunS09,
  title = {Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security},
  author = {M. Razvi Doomun and K. M. S. Soyjaudah},
  year = {2009},
  url = {http://ijns.femto.com.tw/contents/ijns-v9-n1/ijns-2009-v9-n1-p82-94.pdf},
  tags = {security},
  researchr = {https://researchr.org/publication/DoomunS09},
  cites = {0},
  citedby = {0},
  journal = {I. J. Network Security},
  volume = {9},
  number = {1},
  pages = {82-94},
}