Cite

[1] The Internet of Things, International Telecommunication Union, 2005. www.itu.int/osg/spu/publications/internetofthings/.Search in Google Scholar

[2] GAVRAS, A.—KARILA, A.—FDIDA, S.—MAY, M.—POTTS, M.: Future Internet Research and Experimentation, SIGCOMM Computer Communication, rev. 37 No. 3 (July 2007), 89–92.10.1145/1273445.1273460Search in Google Scholar

[3] REED, D. A.—GANNON, D. B.—LARUS, J. R.: Imagining the Future: Thoughts on Computing, Computer 45 No. 1 (Jan 2012), 25–30.10.1109/MC.2011.327Search in Google Scholar

[4] WEBER, R. H.: Internet of Things — New Security and Privacy Challenges, Computer Law & Security Review 26 No. 1 (Jan 2010), 23–30.10.1016/j.clsr.2009.11.008Search in Google Scholar

[5] KAZANAVICIUS, E.—KAZANAVICIUS, V.—VENCKAUSKAS, A.—PASKEVICIUS, R.: Securing Web Application by Embedded Firewall, Electronics and Electrical Engineering 3(119) (2012), 65–68.10.5755/j01.eee.119.3.1366Search in Google Scholar

[6] FREIER, A.—KARLTON, P.—KOCHER, P.: The Secure Sockets Layer (SSL) Protocol Version 3.0, www.rfc-editor.org/rfc/rfc6101.txt.Search in Google Scholar

[7] GUPTA, V.—WURM, M.: The Energy Cost of SSL in Deeply Embedded Systems, Sun Microsystems Inc., Tech. Rep. SMLI TR-2008-173, 2008.Search in Google Scholar

[8] KAMEL, M.—BOUDAOUD, K.—LEQUEUX, S.—RIVEILL, M.: Designing Security Protocols Adapted to the Constraints of Mobile Environments, Embedded and Ubiquitous Computing (EUC), IEEE/IFIP 8th International Conference on, 11-13 Dec 2010, pp. 624–629.10.1109/EUC.2010.100Search in Google Scholar

[9] PRASITHSANGAREE, P.—KRISHNAMURTHY, P.: On a Framework for Energy-Efficient Security Protocols in Wireless Networks, Computer Communications 27 No. 17 (Nov 2004), 1716–1729.10.1016/j.comcom.2004.05.022Search in Google Scholar

[10] CANO, M. D.—DOMENECH-ASENSI, G.: A Secure Energy-Efficient m-Banking Application for Mobile Devices, Journal of Systems and Software 84 No. 11 (Nov 2011), 1899–1909.10.1016/j.jss.2011.06.024Search in Google Scholar

[11] POTLAPALLY, N. R.—RAVI, S.—RAGHUNATHAN, A.—LEE, R. B.—JHA, N. K.: Configuration and Extension of Embedded Processors to Optimize IPSec Protocol Execution, IEEE Transactions on Very Large Scale Integration (VLSI) Systems 15 No. 5 (May 2007), 605–609.10.1109/TVLSI.2007.896912Search in Google Scholar

[12] VENČKAUSKAS, A.—JUSAS, N.—KIŽAUSKIENE, L.—KAZANAVIČIUS, E.—KAZANAVIČIUS, V.: Security Method of Embedded Software for Mechatronic Systems, Mechanika 18 No. 2 (2012), 196–202.Search in Google Scholar

[13] VENČKAUSKAS, A.—JUSAS, N.—MIKUCKIENĖ, I.—MACIULEVIČIUS, S.: Generation of the Secret Encryption Key using the Signature of the Embedded System, Information Technology and Control 41 No. 4 (2012), 368–375.Search in Google Scholar

[14] MARLER, R.—ARORA, J.: Survey of Multi-Objective Optimization Methods for Engineering, Structural and Multidisciplinary Optimization 26 No. 6 (2004), 369–395.10.1007/s00158-003-0368-6Search in Google Scholar

[15] PASTORE, M.—EMMETT, D.: COMPTIA SECURITY+ ST. GUIDE DELUXE, John Wiley & Sons, 2006, OpenSSL Software Distribution. http://www.openssl.org/.Search in Google Scholar

[16] TOLDINAS, J.—STUIKYS, V.—DAMASEVICIUS, R.—ZIBERKAS, G.—BANIONIS, M.: Energy Efficiency Comparison with Cipher Strength of AES and Rijndael Cryptographic Algorithms in Mobile Devices, Electronics and Electrical Engineering 2(108) (2011), 11–14.10.5755/j01.eee.108.2.134Search in Google Scholar

[17] KANSAL, A.—FENG ZHAO—JIE LIU—KOTHARI, N.—BHATTACHARYA, A. A.: Virtual Machine Power Metering and Provisioning, In Proceedings of the 1st ACM Symposium on Cloud Computing (SoCC ’10), ACM, New York, NY, USA, 2010, pp. 39–50.10.1145/1807128.1807136Search in Google Scholar

eISSN:
1339-309X
Language:
English
Publication timeframe:
6 times per year
Journal Subjects:
Engineering, Introductions and Overviews, other