-
3
-
-
84866884536
-
-
B. Crowell. Vibrations and Waves. Available at http://www.lightandmatter. com/html-books/3vw/ch02/ch02.html, 2009.
-
(2009)
Vibrations and Waves
-
-
Crowell, B.1
-
10
-
-
80051911758
-
-
Creative Asia. Creative inspire m5300 5.1 speakers. Available at http://asia.creative.com/products/product.asp?category=4&subcategory= 25&product=15999&nav=1&listby, 2010.
-
(2010)
Creative Inspire M5300 5.1 Speakers
-
-
-
12
-
-
70349301622
-
RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
-
A. Czeskis, K. Koscher, J. Smith, and T. Kohno. RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications. In ACM Conference on Computer and Communications Security, 2008.
-
(2008)
ACM Conference on Computer and Communications Security
-
-
Czeskis, A.1
Koscher, K.2
Smith, J.3
Kohno, T.4
-
14
-
-
77957278441
-
HB#: Increasing the security and efficiency of HB+
-
H. Gilbert, M. Robshaw, and Y. Seurin. HB#: Increasing the Security and Efficiency of HB+. In EuroCrypt, 2008.
-
(2008)
EuroCrypt
-
-
Gilbert, H.1
Robshaw, M.2
Seurin, Y.3
-
17
-
-
85077701725
-
Least we remember: Cold boot attacks on encryption keys
-
J. Halderman, S. Schoen, N. Heninger, W. Clarkson, W. Paul, J. Calandrino, A. Feldman, J. Apelbaum, and E. Felten. Least We Remember: Cold Boot Attacks on Encryption Keys. In USENIX Security Symposium, 2008.
-
(2008)
USENIX Security Symposium
-
-
Halderman, J.1
Schoen, S.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.6
Feldman, A.7
Apelbaum, J.8
Felten, E.9
-
19
-
-
50249134033
-
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
-
D. Holcomb, W. Burleson, and K. Fu. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags. In Conference on RFID Security, 2007.
-
(2007)
Conference on RFID Security
-
-
Holcomb, D.1
Burleson, W.2
Fu, K.3
-
20
-
-
68949175522
-
Power-up SRAM state as an identifying fingerprint and source of true random numbers
-
to appear
-
D. E. Holcomb, W. P. Burleson, and K. Fu. Power-up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Transactions on Computers, 2009. to appear.
-
(2009)
IEEE Transactions on Computers
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
21
-
-
63649112419
-
NeuralWISP: An energy-harvesting wireless neural interface with 1-m range
-
J. Holleman, D. Yeager, R. Prasad, J. Smith, and B. Otis. NeuralWISP: An Energy-Harvesting Wireless Neural Interface with 1-m Range. In BioCAS, 2008.
-
(2008)
BioCAS
-
-
Holleman, J.1
Yeager, D.2
Prasad, R.3
Smith, J.4
Otis, B.5
-
22
-
-
80051866121
-
-
ICBuy.com
-
ICBuy.com. LIS302DL Acceleorometer Specifications. Available at http://tec.icbuy.com/product/productView/id/162826.html, 2008.
-
(2008)
LIS302DL Acceleorometer Specifications
-
-
-
23
-
-
80051898443
-
Energy scavenging for inductively coupled passive RFID systems
-
B. Jiang, S. Roy, K. Sundara-Rajan, M. Philipose, J. Smith, and A. Mamishev. Energy Scavenging for Inductively Coupled Passive RFID Systems. In IEEE Instrumentation and Measurement Technology Conference, 2005.
-
(2005)
IEEE Instrumentation and Measurement Technology Conference
-
-
Jiang, B.1
Roy, S.2
Sundara-Rajan, K.3
Philipose, M.4
Smith, J.5
Mamishev, A.6
-
24
-
-
33847376449
-
Energy scavenging for inductively coupled passive RFID systems
-
B. Jiang, J. Smith, M. Philipose, S. Roy, K. Sundara-Rajan, and A. Mamishev. Energy scavenging for inductively coupled passive RFID systems. In IEEE Transactions on Instrumentation and Measurement, 2007.
-
(2007)
IEEE Transactions on Instrumentation and Measurement
-
-
Jiang, B.1
Smith, J.2
Philipose, M.3
Roy, S.4
Sundara-Rajan, K.5
Mamishev, A.6
-
25
-
-
30344469114
-
Authenticating pervasive devices with human protocols
-
A. Juels and S. Weis. Authenticating Pervasive Devices with Human Protocols. In CRYPTO, 2005.
-
(2005)
CRYPTO
-
-
Juels, A.1
Weis, S.2
-
28
-
-
80051912756
-
-
MEMS Industry Group. Nokia Beats Apple to Compass-in-Phone. Available at http://memsblog.wordpress.com/2009/12/03/nokia-beats-apple-to-compass-in-phone/, 2009.
-
(2009)
Nokia Beats Apple to Compass-in-phone
-
-
-
29
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
D. Molnar and D. Wagner. Privacy and Security in Library RFID: Issues, Practices, and Architectures. In ACM Computer and Communications Security, 2004.
-
(2004)
ACM Computer and Communications Security
-
-
Molnar, D.1
Wagner, D.2
-
30
-
-
70350687503
-
Design of a true random number generator using audio input
-
R. Morrison. Design of a True Random Number Generator Using Audio Input. In Journal of Craptology, 2001.
-
(2001)
Journal of Craptology
-
-
Morrison, R.1
-
32
-
-
3843081053
-
A statistical test suite for random and pseudorandom number generators for cryptographic applications
-
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. In Special Publication 800-22, Available at csrc.nist.gov/groups/ ST/toolkit/rng/documentation-software.html, 2008.
-
(2008)
Special Publication 800-22
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
Dray, J.11
Vo, S.12
-
33
-
-
84858390549
-
Design of a passively-powered, programmable sensing platform for UHF RFID systems
-
A. Sample, D. Yeager, P. Powledge, and J. Smith. Design of a Passively-Powered, Programmable Sensing Platform for UHF RFID Systems. In IEEE International Conference on RFID, 2007.
-
(2007)
IEEE International Conference on RFID
-
-
Sample, A.1
Yeager, D.2
Powledge, P.3
Smith, J.4
-
34
-
-
84856101295
-
We can remember it for you wholesale: Implications of data remanence on the use of RAM for true random number generation on RFID tags
-
N. Saxena and J. Voris. We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags. In Conference on RFID Security, 2009.
-
(2009)
Conference on RFID Security
-
-
Saxena, N.1
Voris, J.2
-
35
-
-
80051881367
-
Behavior evaluation of sika deer (Cervus nippon) by RFID system
-
N. Segawa. Behavior Evaluation of Sika Deer (Cervus Nippon) by RFID System. In WISP Summit, 2009.
-
(2009)
WISP Summit
-
-
Segawa, N.1
-
37
-
-
85009517134
-
A wirelessly-powered platform for sensing and computation
-
J. Smith, A. Sample, P. Powledge, A. Mamishev, and S. Roy. A Wirelessly-Powered Platform for Sensing and Computation. In 8th International Conference on Ubiquitous Computing, 2006.
-
(2006)
8th International Conference on Ubiquitous Computing
-
-
Smith, J.1
Sample, A.2
Powledge, P.3
Mamishev, A.4
Roy, S.5
|