-
1
-
-
67650234288
-
Ultra-low power optimizations for the ieee 802.15.4 networking protocol
-
M. Mura, "Ultra-low power optimizations for the ieee 802.15.4 networking protocol," in proceedings of MASS, 2007.
-
Proceedings of MASS, 2007
-
-
Mura, M.1
-
2
-
-
85014332650
-
Security in embedded systems: Design challenges
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in embedded systems: Design challenges," Trans. on Embedded Computing Sys., vol. 3, no. 3, pp. 461-491, 2004.
-
(2004)
Trans. on Embedded Computing Sys.
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
3
-
-
33744479199
-
IPSec Hardware Resource Requirements Evaluation
-
Rome, Italy: EuroNGI, 18 Apr.
-
A. Ferrante, V. Piuri, and J. Owen, "IPSec Hardware Resource Requirements Evaluation," in NGI 2005. Rome, Italy: EuroNGI, 18 Apr. 2005.
-
(2005)
NGI 2005
-
-
Ferrante, A.1
Piuri, V.2
Owen, J.3
-
5
-
-
34748898963
-
The energy cost of cryptographic key establishment in wireless sensor networks
-
New York, NY, USA: ACM
-
J. Grossschädl, A. Szekely, and S. Tillich, "The energy cost of cryptographic key establishment in wireless sensor networks," in ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security. New York, NY, USA: ACM, 2007, pp. 380-382.
-
(2007)
ASIACCS '07: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
, pp. 380-382
-
-
Grossschädl, J.1
Szekely, A.2
Tillich, S.3
-
6
-
-
33748300805
-
Battery power-aware encryption
-
R. Chandramouli, S. Bapatla, K. P. Subbalakshmi, and R. N. Uma, "Battery power-aware encryption," ACM Trans. Inf. Syst. Secur., vol. 9, no. 2, pp. 162-180, 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.2
, pp. 162-180
-
-
Chandramouli, R.1
Bapatla, S.2
Subbalakshmi, K.P.3
Uma, R.N.4
-
7
-
-
24944447171
-
Resource-aware self-adaptive security provisioning in mobile ad hoc networks
-
13-17 March
-
C. Chigan, L. Li, and Y. Ye, "Resource-aware self-adaptive security provisioning in mobile ad hoc networks," in Wireless Communications and Networking Conference, 2005 IEEE, vol. 4, 13-17 March 2005, pp. 2118-2124.
-
(2005)
Wireless Communications and Networking Conference, 2005 IEEE
, vol.4
, pp. 2118-2124
-
-
Chigan, C.1
Li, L.2
Ye, Y.3
-
8
-
-
47649113722
-
An energy efficient link-layer security protocol for wireless sensor networks
-
L. Lighfoot, J. Ren, and T. Li, "An energy efficient link-layer security protocol for wireless sensor networks," in Electro/Information Technology, 2007 IEEE International Conference on, May 2007, pp. 233-238.
-
Electro/Information Technology, 2007 IEEE International Conference On, May 2007
, pp. 233-238
-
-
Lighfoot, L.1
Ren, J.2
Li, T.3
-
11
-
-
0025897759
-
Specifying graceful degradation
-
Jan
-
M. Herlihy and J. Wing, "Specifying graceful degradation," Parallel and Distributed Systems, IEEE Transactions on, vol. 2, no. 1, pp. 93-104, Jan 1991.
-
(1991)
Parallel and Distributed Systems, IEEE Transactions on
, vol.2
, Issue.1
, pp. 93-104
-
-
Herlihy, M.1
Wing, J.2
-
12
-
-
33646742391
-
Providing real-time applications with graceful degradation of qos and fault tolerance according to (m, k) -firm model
-
May
-
J. Li, Y. Song, and F. Simonot-Lion, "Providing real-time applications with graceful degradation of qos and fault tolerance according to (m, k) -firm model," Industrial Informatics, IEEE Transactions on, vol. 2, no. 2, pp. 112-119, May 2006.
-
(2006)
Industrial Informatics, IEEE Transactions on
, vol.2
, Issue.2
, pp. 112-119
-
-
Li, J.1
Song, Y.2
Simonot-Lion, F.3
-
13
-
-
0036282229
-
Minimizing energy consumption of secure wireless session with qos constraints
-
28 April-2 May
-
R. Karri and P. Mishra, "Minimizing energy consumption of secure wireless session with qos constraints," in Proc. IEEE International Conference on Communications ICC 2002, vol. 4, 28 April-2 May 2002, pp. 2053-2057.
-
(2002)
Proc. IEEE International Conference on Communications ICC 2002
, vol.4
, pp. 2053-2057
-
-
Karri, R.1
Mishra, P.2
-
14
-
-
16244390871
-
An adaptive security/performance encryption system
-
M. E. El-Hennawy, Y. H. Dakroury, M. M. Kouta, and M. M. El-Gendy, "An adaptive security/performance encryption system," in Proc. International Conference on Electrical, Electronic and Computer Engineering ICEEC '04, 5-7 Sept. 2004, pp. 245-248.
-
Proc. International Conference on Electrical, Electronic and Computer Engineering ICEEC '04, 5-7 Sept. 2004
, pp. 245-248
-
-
El-Hennawy, M.E.1
Dakroury, Y.H.2
Kouta, M.M.3
El-Gendy, M.M.4
-
15
-
-
72249104026
-
Negotiation of security services: A multi-criteria decision approach
-
A. V. Taddeo, P. Marcon, and A. Ferrante, "Negotiation of security services: a multi-criteria decision approach," in Proceedings of the 4th Workshop on Embedded Systems Security, Grenoble, France, October 2009.
-
Proceedings of the 4th Workshop on Embedded Systems Security, Grenoble, France, October 2009
-
-
Taddeo, A.V.1
Marcon, P.2
Ferrante, A.3
|