Amit Jain : is working as Assistant Professor in CSE Department at
Sir Padampat Singhaniya University, Udaipur. He obtained M.Tech.
Degree in Computer Science. His area of Research is “Information
Security”. He has published 4 papers in International Conference and
10 papers in national conference. At present he is pursuing Ph.D. in
Computer Science from Sir Padampat Singhania University, Udaipur.
Divya Bhatnagar : is presently working as Assistant Professor in the
department of Computer Sc. & Engg. at Sir Padampat Singhania
University, Udaipur, India. She was born in Gwalior, Madhya
Pradesh, India. After completing her Master Degree in 1996 she
received Post Graduate Diploma in Operations Management and
thereafter, Doctoral Degree in Computer Application in 2012. She has
a teaching and administration experience of 17 years in the field of
Computer Science and Engineering, Computer Applications, IT,
Management, and related fields. She has about 30 research
publications in National, International Journals and Conferences. The
major research areas of interest are data mining, neural network and
privacy preserving data mining.
[1] Ruangchaijatupon, P. Krishnamurthy, ''Encryption and
Power Consumption in Wireless LANs-N’’, The 3rd
IEEE Workshop on Wireless LANs, September 27-28,
2001, Newton, Massachusetts.
[2] Hardjono, ''Security In Wireless LANS And MANS','
Artech House Publishers 2005.
[3] W. Stallings, ''Cryptography and Network Security 4th
Ed”, Prentice Hall, 2005, PP, 58-309.
[4] Coppersmith, D., "The Data Encryption Standard
(DES) and Its Strength Against Attacks", IBM Journal of Research and Development, May 1994, PP 243 -
250.
[5] Bruce Schneier, “The Blowfish Encryption
Algorithm”.
[6] K. Naik, D. S.L. Wei, “Software Implementation
Strategies for Power-Conscious Systems”, Mobile
Networks and Applications - 6, PP 291-305, 2001.
[7] Daemen, J. and Rijmen, V., "Rijndael: The Advanced
Encryption Standard", Dr. Dobb's Journal, March
2001, PP. 137-139.
[8] N. El-Fishawy, "Quality of Encryption Measurement
of Bitmap Images with RC6, MRC6 and Rijndael
Block Cipher Algorithms", International Journal of
Network Security, , Nov. 2007, PP. 241–251
[9] K. McKay, ''Trade-offs Between Energy and Security
in Wireless Networks Thesis',' Worcester Polytechnic
Institute, April 2005.
[10] R. Chandramouli, ''Battery power-aware encryption -
ACM Transactions on Information and System
Security (TISSEC)',' Volume 9, Issue 2, May. 2006.
[11] S.Hirani, ''Energy Consumption of Encryption
Schemes in Wireless Devices Thesis”, university of
Pittsburgh, April 9, 2003.
[12] "A Performance Comparison of Data Encryption
Algorithms”, IEEE First International Conference,
ICICT 2005, PP. 84- 89.
[13] Results of comparing tens of encryption algorithms
using different settings - Crypto++ benchmark.
Retrieved October 1, 2008, from:
http://www.eskimo.com/~weidai/benchmarks.html
[14] S.Z.S. Idrus, S.A. Aljunid, S.M. Asi, ''Performance
Analysis of Encryption Algorithms Text Length Size
on Web Browsers”, IJCSNS International Journal of
Computer Science and Network Security, VOL.8
No.1, January 2008, PP 20-25.
[15] A.A. Tamimi, ''Performance Analysis of Data
Encryption Algorithms”, Retrieved October 1, 2008
from http://www.cs.wustl.edu/~jain/cse567-
06/ftp/encryption_perf /index.html
[16] Sinha, A.P. Chandrakasan, JouleTrack, ''A Web Based
Tool for Software Energy Profiling” proceedings of the
38th Design, NV, Las Vegas, US P.P. 220-225