A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment.
Firdous KausarAyesha NaureenPublished in: ISA (2009)
Keyphrases
- pervasive computing
- computing environments
- smart environments
- pervasive environments
- encryption scheme
- ambient intelligence
- wireless sensor networks
- mobile devices
- context aware
- intelligent environments
- daily life
- context awareness
- ubiquitous computing
- service discovery
- mobile computing
- data warehouse
- standard model
- sensor networks
- wireless networks
- activity recognition
- human subjects
- lossless compression
- management system
- database