Comparison of CRC and KECCAK Based Message Authentication for Resource-Constrained Devices.
Yang YuSha TaoElena DubrovaPublished in: NEWCAS (2018)
Keyphrases
- resource constrained
- security mechanisms
- resource constraints
- sensor networks
- resource limitations
- wireless sensor networks
- embedded systems
- visual sensor networks
- rfid tags
- low cost
- key management
- mobile devices
- session initiation protocol
- multipath
- open source
- software systems
- image authentication
- search algorithm