-
1
-
-
33646430870
-
Securing embedded systems
-
D. D. Hwang, P. Schaumont, K. Tiri, and I. Verbauwhede, "Securing embedded systems," IEEE Securiyt and Privacy, vol. 4, no.2, pp. 40-49, 2006.
-
(2006)
IEEE Securiyt and Privacy
, vol.4
, Issue.2
, pp. 40-49
-
-
Hwang, D.D.1
Schaumont, P.2
Tiri, K.3
Verbauwhede, I.4
-
2
-
-
0028711545
-
Power Analysis of Embedded Software: A First Step towards Software Power Minimization
-
V. Tiwari, S. Malik, A. Wolfe, "Power Analysis of Embedded Software: A First Step towards Software Power Minimization," IEEE/ACM International Conference on Computer-Aided Design, pp. 384-390, 2004.
-
(2004)
IEEE/ACM International Conference on Computer-Aided Design
, pp. 384-390
-
-
Tiwari, V.1
Malik, S.2
Wolfe, A.3
-
4
-
-
4444306048
-
Automated Energy/Performance Macromodeling of Embedded Software
-
A. Muttreja, A. Raghunathan, S. Ravi, N. Jha, "Automated Energy/Performance Macromodeling of Embedded Software," In Proceedings of the 41st Annual Design Automation Conference, vol. 26, no.3, pp. 99-102, 2004.
-
(2004)
Proceedings of the 41st Annual Design Automation Conference
, vol.26
, Issue.3
, pp. 99-102
-
-
Muttreja, A.1
Raghunathan, A.2
Ravi, S.3
Jha, N.4
-
5
-
-
27944433815
-
Hybrid Simulation for Embedded Software Energy Estimation
-
A
-
A. Muttreja, A, Raghunathan, S. Ravi, N. Jha, "Hybrid Simulation for Embedded Software Energy Estimation," In Proceedings of the 42nd Annual Design Automation Conference, pp. 23-26, 2005.
-
(2005)
Proceedings of the 42nd Annual Design Automation Conference
, pp. 23-26
-
-
Muttreja, A.1
Ravi, R.S.2
Jha, N.3
-
6
-
-
0033336340
-
An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems
-
W. Freeman, E. Miller, "An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems," International Symposium on Modeling, Analysis, and Simulation of Computer and Telecomm Systems, pp. 348-357, 1999.
-
(1999)
International Symposium on Modeling, Analysis, and Simulation of Computer and Telecomm Systems
, pp. 348-357
-
-
Freeman, W.1
Miller, E.2
-
7
-
-
33748300805
-
Battery Power-Aware Encryption
-
R. Chandramouli, S. Bapatla, K. P. Subbalakshmi, R. N. Uma, "Battery Power-Aware Encryption," ACM Transactions on Information and System Security, vol. 9, pp. 162-180, 2006.
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, pp. 162-180
-
-
Chandramouli, R.1
Bapatla, S.2
Subbalakshmi, K.P.3
Uma, R.N.4
-
8
-
-
33646382089
-
A Study of the Energy Consumption Characteristics of Cryptographic Algorithm and Security Protocols
-
N. R. Potlapally, S. Ravi, A. Raghunathan, N. K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithm and Security Protocols," IEEE Transactions on Mobile Computing, vol. 5, no.2, pp.128-143, 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
9
-
-
33845228748
-
Energy Characterization of Embedded Real-time Operating Systems
-
A. Acquaviva, L. Benini, B. Ricco, "Energy Characterization of Embedded Real-time Operating Systems," ACM SIGARCH Computer Architecture News, vol. 29, no.5, pp.13-18, 2001.
-
(2001)
ACM SIGARCH Computer Architecture News
, vol.29
, Issue.5
, pp. 13-18
-
-
Acquaviva, A.1
Benini, L.2
Ricco, B.3
-
10
-
-
40949096414
-
Measurement of Energy Costs of Security in Wireless Sensor Nodes
-
C. Chang, S. Muftic, D.J. Nagel, "Measurement of Energy Costs of Security in Wireless Sensor Nodes", Proceedings of 16th International Conference on Computer Communications and Networks, pp. 95-102, 2007
-
(2007)
Proceedings of 16th International Conference on Computer Communications and Networks
, pp. 95-102
-
-
Chang, C.1
Muftic, S.2
Nagel, D.J.3
-
11
-
-
84990928853
-
On energy-Security Tradeoffs and Cooperation for Wireless Ad Hoc Networks
-
January
-
C. Comaniciu, "On energy-Security Tradeoffs and Cooperation for Wireless Ad Hoc Networks", Journal of Cyber Security and Mobility, January, pp.53-64, 2012.
-
(2012)
Journal of Cyber Security and Mobility
, pp. 53-64
-
-
Comaniciu, C.1
-
12
-
-
82155167643
-
Energy Efficient Security algorithm for Power Grid Wide Area Monitoring System
-
M. Qiu, W. Gao, M. Chen, et al, "Energy Efficient Security algorithm for Power Grid Wide Area Monitoring System", IEEE Transactions on Smart Grid, vol.2, no.4, pp. 715-723, 2011
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.4
, pp. 715-723
-
-
Qiu, M.1
Gao, W.2
Chen, M.3
|