Low-cost implementations of NTRU for pervasive security.
Ali Can AticiLejla BatinaJunfeng FanIngrid VerbauwhedeSiddika Berna ÖrsPublished in: ASAP (2008)
Keyphrases
- low cost
- rfid tags
- information security
- security issues
- network security
- intrusion detection
- statistical databases
- access control
- real time
- low power
- security policies
- context aware
- data security
- security requirements
- smart card
- security measures
- security threats
- security problems
- security model
- computer security
- highly efficient
- security management
- security level
- information assurance
- authentication protocol
- security protocols
- key management
- network management
- digital camera
- efficient implementation
- power consumption