메뉴 건너뛰기




Volumn , Issue , 2013, Pages 907-914

PtNBridge - A power-aware and trustworthy near field communication bridge to embedded systems

Author keywords

Embedded system; Energy management; RFID; Security

Indexed keywords

APPLICATION FIELDS; COMMUNICATION PATH; NEAR FIELD COMMUNICATIONS; POWER SENSOR; POWER-AWARE; SECURITY; SMART-PHONE APPLICATIONS; WIRELESS BRIDGES;

EID: 84890097489     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSD.2013.102     Document Type: Conference Paper
Times cited : (3)

References (20)
  • 2
    • 80053605352 scopus 로고    scopus 로고
    • Security in near field communication (nfc) strengths and weaknesses
    • E. Haselsteiner and K. Breitfus, "Security in near field communication (nfc) strengths and weaknesses," Semiconductors, vol. 11, no. 71, 2006.
    • (2006) Semiconductors , vol.11 , Issue.71
    • Haselsteiner, E.1    Breitfus, K.2
  • 5
    • 75649122972 scopus 로고    scopus 로고
    • Low-cost digital signature architecture suitable for radio frequency identification tags
    • M. O"Neill and M. J. B. Robshaw, "Low-cost digital signature architecture suitable for radio frequency identification tags," Computers Digital Techniques, IET, vol. 4, no. 1, pp. 14-26, 2009.
    • (2009) Computers Digital Techniques, IET , vol.4 , Issue.1 , pp. 14-26
    • O'Neill, M.1    Robshaw, M.J.B.2
  • 6
    • 33749019592 scopus 로고    scopus 로고
    • A low-cost ecc coprocessor for smartcards
    • ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds. Springer Berlin Heidelberg
    • H. Aigner, H. Bock, M. Hütter, and J. Wolkerstorfer, "A low-cost ecc coprocessor for smartcards," in Cryptographic Hardware and Embedded Systems-CHES 2004, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds. Springer Berlin Heidelberg, 2004, vol. 3156, pp. 107-118.
    • (2004) Cryptographic Hardware and Embedded Systems-CHES 2004 , vol.3156 , pp. 107-118
    • Aigner, H.1    Bock, H.2    Hütter, M.3    Wolkerstorfer, J.4
  • 9
    • 85014332650 scopus 로고    scopus 로고
    • Security in embedded systems: Design challenges
    • Aug. [Online]
    • S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in embedded systems: Design challenges," ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, pp. 461-491, Aug. 2004. [Online]. Available: http://doi.acm.org/10. 1145/1015047.1015049
    • (2004) ACM Trans. Embed. Comput. Syst. , vol.3 , Issue.3 , pp. 461-491
    • Ravi, S.1    Raghunathan, A.2    Kocher, P.3    Hattangady, S.4
  • 10
    • 37149018890 scopus 로고    scopus 로고
    • A survey of lightweightcryptography implementations
    • T. Eisenbarth and S. Kumar, "A survey of lightweightcryptography implementations," Design Test of Computers, IEEE, vol. 24, no. 6, pp. 522-533, 2007.
    • (2007) Design Test of Computers, IEEE , vol.24 , Issue.6 , pp. 522-533
    • Eisenbarth, T.1    Kumar, S.2
  • 12
    • 20344362413 scopus 로고    scopus 로고
    • Improving memory encryption performance in secure processors
    • J. Yang, L. Gao, and Y. Zhang, "Improving memory encryption performance in secure processors," Computers, IEEE Transactions on, vol. 54, no. 5, pp. 630-640, 2005.
    • (2005) Computers, IEEE Transactions on , vol.54 , Issue.5 , pp. 630-640
    • Yang, J.1    Gao, L.2    Zhang, Y.3
  • 14
    • 37149012925 scopus 로고    scopus 로고
    • Security-performance tradeoffs in embedded systems using flexible ecc hardware
    • H. Alrimeih and D. Rakhmatov, "Security-performance tradeoffs in embedded systems using flexible ecc hardware," Design Test of Computers, IEEE, vol. 24, no. 6, pp. 556-569, 2007.
    • (2007) Design Test of Computers, IEEE , vol.24 , Issue.6 , pp. 556-569
    • Alrimeih, H.1    Rakhmatov, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.