Hamad, 2010 - Google Patents
Energy-aware Encryption Mechanism for M-commerce DevicesHamad, 2010
View PDF- Document ID
- 17361750718390049971
- Author
- Hamad F
- Publication year
External Links
Snippet
With the wide spread of mobile phones, PDAs, and Smartphones, M-Commerce has become a major application domain for mobile devices, unlike conventional wired networks, mobile devices allow the user to conduct online transactions regardless of the time and the …
- 238000004422 calculation algorithm 0 abstract description 51
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power Management, i.e. event-based initiation of power-saving mode
- G06F1/3206—Monitoring a parameter, a device or an event triggering a change in power modality
- G06F1/3209—Monitoring remote activity, e.g. over telephone line, network connection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power Management, i.e. event-based initiation of power-saving mode
- G06F1/3234—Action, measure or step performed to reduce power consumption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0261—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Malina et al. | On perspective of security and privacy-preserving solutions in the internet of things | |
Roman et al. | A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes | |
Potlapally et al. | A study of the energy consumption characteristics of cryptographic algorithms and security protocols | |
Sharma et al. | Security frameworks for wireless sensor networks-review | |
Louw et al. | A key distribution scheme using elliptic curve cryptography in wireless sensor networks | |
Hirani | Energy consumption of encryption schemes in wireless devices | |
US11051247B2 (en) | Transmission/ reception device with wake-up radio resistant to attacks by denial of sleep | |
Shaikh et al. | LSec: Lightweight security protocol for distributed wireless sensor network | |
Roy et al. | A security framework for military application on infrastructure based wireless sensor network | |
Prasithsangaree et al. | On a framework for energy-efficient security protocols in wireless networks | |
Othman et al. | Secure data aggregation with MAC authentication in wireless sensor networks | |
Iyer et al. | Implementation and evaluation of lightweight ciphers in MQTT environment | |
Hager | Context aware and adaptive security for wireless networks | |
Mittal et al. | Light weight cryptography for cloud-based e-health records | |
AlJabri et al. | [Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices | |
Batra et al. | Research and analysis of lightweight cryptographic solutions for internet of things | |
Zegers et al. | A lightweight encryption and secure protocol for smartphone cloud | |
Naaz et al. | Secure and efficient edge computing framework for iot | |
CN101317357B (en) | Key management | |
Kofuji | Performance analysis of encryption algorithms on mobile devices | |
Samanthula et al. | A probabilistic encryption based MIN/MAX computation in wireless sensor networks | |
Elleuchi et al. | Securing RPL-based Internet of Things applied for water pipeline monitoring | |
Li et al. | Efficient link layer security scheme for wireless sensor networks | |
Gatate et al. | Spectrum aware cryptography (SAC) in wireless cognitive radio sensor networks for delay sensitive applications | |
Hamad | Energy-aware Encryption Mechanism for M-commerce Devices |