-
1
-
-
0034876765
-
Wireless sensor networks: Application driver for low power distributed systems
-
D. Estrin, "Wireless sensor networks: Application driver for low power distributed systems," in Proc. IEEE Int. Symp. Low Power Electronics and Design, 2001, p. 194.
-
(2001)
Proc. IEEE Int. Symp. Low Power Electronics and Design
, pp. 194
-
-
Estrin, D.1
-
2
-
-
4344668573
-
Guest editors' introduction: Overview of sensor networks
-
D. E. Culler, D. Estrin, and M. B. Srivastava, "Guest editors' introduction: Overview of sensor networks," IEEE Computer, vol. 37, no. 8, pp. 41-49, 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.8
, pp. 41-49
-
-
Culler, D.E.1
Estrin, D.2
Srivastava, M.B.3
-
3
-
-
0141621110
-
Wireless sensor networks
-
E. Cayirci, R. Govindan, T. Znati, and M. B. Srivastava, "Wireless sensor networks," Computer Networks, vol. 43, no. 4, pp. 417-419, 2003.
-
(2003)
Computer Networks
, vol.43
, Issue.4
, pp. 417-419
-
-
Cayirci, E.1
Govindan, R.2
Znati, T.3
Srivastava, M.B.4
-
4
-
-
80052049053
-
Compressed sensing for real-time energy-efficient ECG compression on wireless body sensor nodes
-
Sep.
-
H. Mamaghanian, N. Khaled, D. Atienza, and P. Vandergheynst, "Compressed sensing for real-time energy-efficient ECG compression on wireless body sensor nodes," IEEE Trans. Biomedical Engineering, vol. 58, pp. 2456-2466, Sep. 2011.
-
(2011)
IEEE Trans. Biomedical Engineering
, vol.58
, pp. 2456-2466
-
-
Mamaghanian, H.1
Khaled, N.2
Atienza, D.3
Vandergheynst, P.4
-
6
-
-
78349270924
-
Implementation of compressed sensing in telecardiology sensor networks
-
7, Jan.
-
E. C. Pinheiro, O. A. Postolache, and P. S. Girão, "Implementation of compressed sensing in telecardiology sensor networks," Int. J. Telemedicine Appl., vol. 2010, pp. 7:1-7:7, Jan. 2010.
-
(2010)
Int. J. Telemedicine Appl.
, vol.2010
, Issue.1-7
, pp. 7
-
-
Pinheiro, E.C.1
Postolache, O.A.2
Girão, P.S.3
-
7
-
-
80052045170
-
Random access compressed sensing for energy-efficient underwater sensor networks
-
Sep.
-
F. Fazel, M. Fazel, and M. Stojanovic, "Random access compressed sensing for energy-efficient underwater sensor networks," IEEE J. Selected Areas in Communications, vol. 29, no. 8, pp. 1660-1670, Sep. 2011.
-
(2011)
IEEE J. Selected Areas in Communications
, vol.29
, Issue.8
, pp. 1660-1670
-
-
Fazel, F.1
Fazel, M.2
Stojanovic, M.3
-
8
-
-
0036688074
-
A survey on sensor networks
-
Aug.
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
10
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
D. Djenouri, L. Khelladi, and A. Badache, "A survey of security issues in mobile ad hoc and sensor networks," IEEE Communications Surveys, vol. 7, no. 4, pp. 2-28, 2005.
-
(2005)
IEEE Communications Surveys
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, A.3
-
11
-
-
85014332650
-
Security in embedded systems: Design challenges
-
Aug.
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in embedded systems: Design challenges," ACM Trans. Embedded Computing Systems, vol. 3, no. 3, pp. 461-491, Aug. 2004.
-
(2004)
ACM Trans. Embedded Computing Systems
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
12
-
-
40949096414
-
Measurement of energy costs of security in wireless sensor nodes
-
Aug.
-
C.-C. Chang, S. Muftic, and D. Nagel, "Measurement of energy costs of security in wireless sensor nodes," in Proc. IEEE Int. Conf. Computer Communications and Networks, Aug. 2007, pp. 95-102.
-
(2007)
Proc. IEEE Int. Conf. Computer Communications and Networks
, pp. 95-102
-
-
Chang, C.-C.1
Muftic, S.2
Nagel, D.3
-
13
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
Nov.
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: A link layer security architecture for wireless sensor networks," in Proc. ACM Int. Conf. Embedded Networked Sensor Systems, Nov. 2004, pp. 162-175.
-
(2004)
Proc. ACM Int. Conf. Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
14
-
-
77953850023
-
Tinysa: A security architecture for wireless sensor networks
-
Dec.
-
J. Grosschadl, "Tinysa: A security architecture for wireless sensor networks," in Proc. ACM Conf. Future Networking Technologies, Dec. 2006, pp. 55:1-55:2.
-
(2006)
Proc. ACM Conf. Future Networking Technologies
, pp. 551-552
-
-
Grosschadl, J.1
-
16
-
-
84941369982
-
A pipeline architecture for encompression (encryption + compression) technology
-
Jan.
-
C. Shaw, D. Chatterji, P. Maji, S. Sen, B. Roy, and P. Pal Chaudhuri, "A pipeline architecture for encompression (encryption + compression) technology," in Proc. Int. Conf. VLSI Design, Jan. 2003, pp. 277-282.
-
(2003)
Proc. Int. Conf. VLSI Design
, pp. 277-282
-
-
Shaw, C.1
Chatterji, D.2
Maji, P.3
Sen, S.4
Roy, B.5
Pal Chaudhuri, P.6
-
17
-
-
33645712892
-
Compressed sensing
-
Apr.
-
D. Donoho, "Compressed sensing," IEEE Trans. Information Theory, vol. 52, no. 4, pp. 1289-1306, Apr. 2006.
-
(2006)
IEEE Trans. Information Theory
, vol.52
, Issue.4
, pp. 1289-1306
-
-
Donoho, D.1
-
18
-
-
31744440684
-
-
Feb.
-
E. Candès, J. Romberg, and T. Tao, "Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information," vol. 52, no. 2, pp. 489-509, Feb. 2006.
-
(2006)
Robust Uncertainty Principles: Exact Signal Reconstruction from Highly Incomplete Frequency Information
, vol.52
, Issue.2
, pp. 489-509
-
-
Candès, E.1
Romberg, J.2
Tao, T.3
-
19
-
-
85032750937
-
People hearing without listening: An introduction to compressive sampling
-
E. Candès and M. Wakin, "People hearing without listening: An introduction to compressive sampling," IEEE Signal Processing Magazine, vol. 25, no. 2, pp. 21-30, 2008.
-
(2008)
IEEE Signal Processing Magazine
, vol.25
, Issue.2
, pp. 21-30
-
-
Candès, E.1
Wakin, M.2
-
20
-
-
62349119084
-
On the security and robustness of encryption via compressed sensing
-
Nov.
-
A. Orsdemir, H. Altun, G. Sharma, and M. Bocko, "On the security and robustness of encryption via compressed sensing," in Proc. IEEE Military Communications Conf., Nov. 2008, pp. 1-7.
-
(2008)
Proc. IEEE Military Communications Conf.
, pp. 1-7
-
-
Orsdemir, A.1
Altun, H.2
Sharma, G.3
Bocko, M.4
-
22
-
-
64549094196
-
The secrecy of compressed sensing easurements
-
Sep.
-
Y. Rachlin and D. Baron, "The secrecy of compressed sensing easurements," in Proc. Allerton Conf. Communication, Control, and Computing, Sep. 2008, pp. 813-817.
-
(2008)
Proc. Allerton Conf. Communication, Control, and Computing
, pp. 813-817
-
-
Rachlin, Y.1
Baron, D.2
-
24
-
-
84875597357
-
-
NIST, "SHA-3 Selection Announcement," http://csrc.nist.gov/ groups/ST/hash/sha-3/sha-3 selection announcement.pdf.
-
SHA-3 Selection Announcement
-
-
-
25
-
-
84890746900
-
Lessons learned from designing a 65 nm ASIC for evaluating third round SHA-3 candidates
-
Mar.
-
F. Gurkaynak, K. Gaj, B. Muheim, E. Homsirikamol, C. Keller, M. Rogawski, H. Kaeslin, and J.-P. Kaps, "Lessons learned from designing a 65 nm ASIC for evaluating third round SHA-3 candidates," in Proc. 3rd SHA-3 Candidate Conf., Mar. 2012.
-
(2012)
Proc. 3rd SHA-3 Candidate Conf.
-
-
Gurkaynak, F.1
Gaj, K.2
Muheim, B.3
Homsirikamol, E.4
Keller, C.5
Rogawski, M.6
Kaeslin, H.7
Kaps, J.-P.8
-
26
-
-
80051993020
-
-
Release v-2004.06 ed., Synopsys Inc., Jun.
-
Power Compiler User Guide Manual, Release v-2004.06 ed., Synopsys Inc., Jun. 2004.
-
(2004)
Power Compiler User Guide Manual
-
-
-
28
-
-
15744395962
-
-
Computer Laboratory, University of Cambridge, Tech. Rep., Oct.
-
R. M. Needham and D. J. Wheeler, "TEA extensions," Computer Laboratory, University of Cambridge, Tech. Rep., Oct. 1997.
-
(1997)
TEA Extensions
-
-
Needham, R.M.1
Wheeler, D.J.2
|