-
1
-
-
33748300805
-
Battery power-aware encryption
-
May
-
R. Chandramouli, S. Bapatla, K. P. Subbalakshmi, and R. N. Uma,"Battery Power-Aware Encryption," ACM Trans. Information and System Security, pp. 162-180, May 2006.
-
(2006)
ACM Trans. Information and System Security
, pp. 162-180
-
-
Chandramouli, R.1
Bapatla, S.2
Subbalakshmi, K.P.3
Uma, R.N.4
-
2
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Feb.
-
N. Potlapally, N., S. Ravi, A. Raghunathan, and N. Jha, 2006."A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Trans. Mobile Computing, pp. 128-143, Feb. 2006.
-
(2006)
IEEE Trans. Mobile Computing
, pp. 128-143
-
-
Potlapally, N.N.1
Ravi, S.2
Raghunathan, A.3
Jha, N.4
-
3
-
-
34548760106
-
An energy-efficient framework for large-scale parallel storage systems
-
March
-
Z. -L. Zong, M. Briggs, N. O'Connor, and X. Qin,"An Energy-Efficient Framework for Large-Scale Parallel Storage Systems," Proc. 21st Int'l Symp. Parallel and Distributed Processing, March 2007.
-
(2007)
Proc. 21st Int'l Symp. Parallel and Distributed Processing
-
-
Zong, Z.-L.1
Briggs, M.2
O'Connor, N.3
Qin, X.4
-
4
-
-
47749146884
-
DiskGroup: Energy efficient disk layout for RAID1 systems
-
Jul.
-
L. Lu and P. Varman,"DiskGroup: Energy Efficient disk Layout for RAID1 Systems," IEEE Int'l Conf. Networking, Architecture, and Storage, pp. 233-242, Jul. 2007.
-
(2007)
IEEE Int'l Conf. Networking, Architecture, and Storage
, pp. 233-242
-
-
Lu, L.1
Varman, P.2
-
5
-
-
66049136629
-
GRAID: A green RAID storage architecture with improved energy efficiency and reliability
-
Sept.
-
B. Mao, D. Feng, H. Jiang, S. Wu, J. Chen, and L. Zeng,"GRAID: A Green RAID Storage Architecture with Improved Energy Efficiency and Reliability", Proc. IEEE/ACM Int'l Symp. Modelling, Analysis and Simulation of Computer and Telecommunication Sys., pp.1-8, Sept. 2008.
-
(2008)
Proc. IEEE/ACM Int'l Symp. Modelling, Analysis and Simulation of Computer and Telecommunication Sys.
, pp. 1-8
-
-
Mao, B.1
Feng, D.2
Jiang, H.3
Wu, S.4
Chen, J.5
Zeng, L.6
-
6
-
-
50249168857
-
Performance evaluation of AES algorithm on various development platforms
-
Jun.
-
C. Parikh and P. Patel,"Performance Evaluation of AES algorithm on Various Development Platforms," IEEE Int'l ymp. Consumer Electronics, pp. 1-6, Jun. 2007.
-
(2007)
IEEE Int'l ymp. Consumer Electronics
, pp. 1-6
-
-
Parikh, C.1
Patel, P.2
-
7
-
-
0034849603
-
Configurable hardware implementation of triple-DES encryption algorithm for wireless local area network
-
May.
-
P. Hamalainen, M. Hannikainen, T. Hamalainen, and J. Saarinen, "Configurable Hardware Implementation of Triple-DES Encryption Algorithm for Wireless Local Area Network," Proc. IEEE Int'l Conf. Acoustics, Speech, and Signal, pp. 1221-1224, May. 2001.
-
(2001)
Proc. IEEE Int'l Conf. Acoustics, Speech, and Signal
, pp. 1221-1224
-
-
Hamalainen, P.1
Hannikainen, M.2
Hamalainen, T.3
Saarinen, J.4
-
9
-
-
72049090252
-
DARAW: A new write buffer to improve parallel I/O energy-efficiency
-
Mar.
-
X.-J. Ruan, A. Manzanares, K. Bellam, X. Qin, and Z. -L. Zong,"DARAW: A New Write Buffer to Improve Parallel I/O Energy-Efficiency," Proc. 24th Annual ACM Symp. Applied Comp., Mar. 2009.
-
(2009)
Proc. 24th Annual ACM Symp. Applied Comp.
-
-
Ruan, X.-J.1
Manzanares, A.2
Bellam, K.3
Qin, X.4
Zong, Z.-L.5
-
12
-
-
34248682000
-
Data encryption standard
-
National Institute of Standards and Technology (NIST), USA
-
"Data Encryption Standard," Federal Information Processing Standards (FIPS) Publication 46-7, National Institute of Standards and Technology (NIST), USA, 1999.
-
(1999)
Federal Information Processing Standards (FIPS) Publication 46-7
-
-
-
14
-
-
0003508558
-
-
National Institute of Standard and Technology. Nov.
-
National Institute of Standard and Technology. Advanced Encryption Standard FIPS 197 [S]. Nov. 2001.
-
(2001)
Advanced Encryption Standard FIPS 197 [S]
-
-
-
15
-
-
24944591357
-
How to break MD5 and other hash functions
-
May
-
X.-Y. Wang and H. Yu,"How to Break MD5 and Other Hash Functions," EUROCRYPT 2005, pp. 19-25, May. 2005.
-
(2005)
EUROCRYPT 2005
, pp. 19-25
-
-
Wang, X.-Y.1
Yu, H.2
-
19
-
-
62849115103
-
Distributed energy- efficient scheduling for data-intensive applications with deadline constraints on data grids
-
Dec.
-
C. Liu, X. Qin, S. Kulkarni, C.-J. Wang, S. Li, A. Manzanares, and S. Baskiyar,"Distributed Energy- Efficient Scheduling for Data-Intensive Applications with Deadline Constraints on Data Grids," Proc. 27th IEEE Int'l Performance Comp. and Communications Conf., Dec. 2008.
-
(2008)
Proc. 27th IEEE Int'l Performance Comp. and Communications Conf.
-
-
Liu, C.1
Qin, X.2
Kulkarni, S.3
Wang, C.-J.4
Li, S.5
Manzanares, A.6
Baskiyar, S.7
|