-
1
-
-
84872066022
-
Nize-A near field communication interface enabling zero energy standby for everyday electronic devices
-
N. Druml, M. Menghin, R. Basagic, C. Steger, R. Weiss, H. Bock, and J. Haid, "Nize-a near field communication interface enabling zero energy standby for everyday electronic devices," in Wireless and Mobile Computing, Networking and Communications (WiMob), 2012 IEEE 8th International Conference on, 2012, pp. 261-267.
-
(2012)
Wireless and Mobile Computing, Networking and Communications (WiMob), 2012 IEEE 8th International Conference on
, pp. 261-267
-
-
Druml, N.1
Menghin, M.2
Basagic, R.3
Steger, C.4
Weiss, R.5
Bock, H.6
Haid, J.7
-
2
-
-
80053605352
-
Security in near field communication (nfc) strengths and weaknesses
-
E. Haselsteiner and K. Breitfus, "Security in near field communication (nfc) strengths and weaknesses," Semiconductors, vol. 11, no. 71, 2006.
-
(2006)
Semiconductors
, vol.11
, Issue.71
-
-
Haselsteiner, E.1
Breitfus, K.2
-
3
-
-
49049112068
-
Nfc devices: Security and privacy
-
G. Madlmayr, J. Langer, C. Kantner, and J. Scharinger, "Nfc devices: Security and privacy," in Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, 2008, pp. 642-647.
-
(2008)
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on
, pp. 642-647
-
-
Madlmayr, G.1
Langer, J.2
Kantner, C.3
Scharinger, J.4
-
4
-
-
78650113016
-
Mutual authentication architecture in wireless sensor networks
-
C.-H. Jiang, H.-L. Li, Y.-J. Huang, and W.-C. Lin, "Mutual authentication architecture in wireless sensor networks," in Microelectronics and Electronics (PrimeAsia), 2010 Asia Pacific Conference on Postgraduate Research in, 2010, pp. 291-294.
-
(2010)
Microelectronics and Electronics (PrimeAsia), 2010 Asia Pacific Conference on Postgraduate Research in
, pp. 291-294
-
-
Jiang, C.-H.1
Li, H.-L.2
Huang, Y.-J.3
Lin, W.-C.4
-
5
-
-
75649122972
-
Low-cost digital signature architecture suitable for radio frequency identification tags
-
M. O"Neill and M. J. B. Robshaw, "Low-cost digital signature architecture suitable for radio frequency identification tags," Computers Digital Techniques, IET, vol. 4, no. 1, pp. 14-26, 2009.
-
(2009)
Computers Digital Techniques, IET
, vol.4
, Issue.1
, pp. 14-26
-
-
O'Neill, M.1
Robshaw, M.J.B.2
-
6
-
-
33749019592
-
A low-cost ecc coprocessor for smartcards
-
ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds. Springer Berlin Heidelberg
-
H. Aigner, H. Bock, M. Hütter, and J. Wolkerstorfer, "A low-cost ecc coprocessor for smartcards," in Cryptographic Hardware and Embedded Systems-CHES 2004, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds. Springer Berlin Heidelberg, 2004, vol. 3156, pp. 107-118.
-
(2004)
Cryptographic Hardware and Embedded Systems-CHES 2004
, vol.3156
, pp. 107-118
-
-
Aigner, H.1
Bock, H.2
Hütter, M.3
Wolkerstorfer, J.4
-
8
-
-
33646430870
-
Securing embedded systems
-
D. Hwang, P. Schaumont, K. Tiri, and I. Verbauwhede, "Securing embedded systems," Security Privacy, IEEE, vol. 4, no. 2, pp. 40-49, 2006.
-
(2006)
Security Privacy, IEEE
, vol.4
, Issue.2
, pp. 40-49
-
-
Hwang, D.1
Schaumont, P.2
Tiri, K.3
Verbauwhede, I.4
-
9
-
-
85014332650
-
Security in embedded systems: Design challenges
-
Aug. [Online]
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in embedded systems: Design challenges," ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, pp. 461-491, Aug. 2004. [Online]. Available: http://doi.acm.org/10. 1145/1015047.1015049
-
(2004)
ACM Trans. Embed. Comput. Syst.
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
10
-
-
37149018890
-
A survey of lightweightcryptography implementations
-
T. Eisenbarth and S. Kumar, "A survey of lightweightcryptography implementations," Design Test of Computers, IEEE, vol. 24, no. 6, pp. 522-533, 2007.
-
(2007)
Design Test of Computers, IEEE
, vol.24
, Issue.6
, pp. 522-533
-
-
Eisenbarth, T.1
Kumar, S.2
-
11
-
-
79951864434
-
Trusted sensors and remote sensing
-
M. Potkonjak, S. Meguerdichian, and J. Wong, "Trusted sensors and remote sensing," in Sensors, 2010 IEEE, 2010, pp. 1104-1107.
-
(2010)
Sensors, 2010 IEEE
, pp. 1104-1107
-
-
Potkonjak, M.1
Meguerdichian, S.2
Wong, J.3
-
12
-
-
20344362413
-
Improving memory encryption performance in secure processors
-
J. Yang, L. Gao, and Y. Zhang, "Improving memory encryption performance in secure processors," Computers, IEEE Transactions on, vol. 54, no. 5, pp. 630-640, 2005.
-
(2005)
Computers, IEEE Transactions on
, vol.54
, Issue.5
, pp. 630-640
-
-
Yang, J.1
Gao, L.2
Zhang, Y.3
-
14
-
-
37149012925
-
Security-performance tradeoffs in embedded systems using flexible ecc hardware
-
H. Alrimeih and D. Rakhmatov, "Security-performance tradeoffs in embedded systems using flexible ecc hardware," Design Test of Computers, IEEE, vol. 24, no. 6, pp. 556-569, 2007.
-
(2007)
Design Test of Computers, IEEE
, vol.24
, Issue.6
, pp. 556-569
-
-
Alrimeih, H.1
Rakhmatov, D.2
-
15
-
-
84856645357
-
What is green security?
-
L. Caviglione, A. Merlo, and M. Migliardi, "What is green security?" in Information Assurance and Security (IAS), 2011 7th International Conference on, 2011, pp. 366-371.
-
(2011)
Information Assurance and Security (IAS), 2011 7th International Conference on
, pp. 366-371
-
-
Caviglione, L.1
Merlo, A.2
Migliardi, M.3
-
16
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on, 2005, pp. 324-328.
-
(2005)
Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
17
-
-
52949115365
-
Analyzing energy and time overhead of security mechanisms in wireless sensor networks
-
P. Trakadas, T. Zahariadis, H. C. Leligou, S. Voliotis, and K. Papadopoulos, "Analyzing energy and time overhead of security mechanisms in wireless sensor networks," in Systems, Signals and Image Processing, 2008. IWSSIP 2008. 15th International Conference on, 2008, pp. 137-140.
-
(2008)
Systems, Signals and Image Processing, 2008. IWSSIP 2008. 15th International Conference on
, pp. 137-140
-
-
Trakadas, P.1
Zahariadis, T.2
Leligou, H.C.3
Voliotis, S.4
Papadopoulos, K.5
-
18
-
-
33750286059
-
Power aware design of an elliptic curve coprocessor for 8 bit platforms
-
341
-
G. Bertoni, L. Breveglieri, and M. Venturi, "Power aware design of an elliptic curve coprocessor for 8 bit platforms," in Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on, 2006, pp. 5 pp.-341.
-
(2006)
Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on
, pp. 5
-
-
Bertoni, G.1
Breveglieri, L.2
Venturi, M.3
-
19
-
-
84870440340
-
Research on cryptographic algorithms for embedded real-time systems: A perspective of measurement-based analysis
-
W. Jiang, Z. Guo, Y. Ma, and N. Sang, "Research on cryptographic algorithms for embedded real-time systems: A perspective of measurement-based analysis," in High Performance Computing and Communication 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), 2012 IEEE 14th International Conference on, 2012, pp. 1495-1501.
-
(2012)
High Performance Computing and Communication 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), 2012 IEEE 14th International Conference on
, pp. 1495-1501
-
-
Jiang, W.1
Guo, Z.2
Ma, Y.3
Sang, N.4
-
20
-
-
78649871185
-
Automated power characterization for run-time power emulation of soc designs
-
sept
-
C. Bachmann, A. Genser, C. Steger, R. Weiss, and J. Haid, "Automated Power Characterization for Run-Time Power Emulation of SoC Designs," in Digital System Design: Architectures, Methods and Tools (DSD), 2010 13th Euromicro Conference on, sept. 2010, pp. 587-594.
-
(2010)
Digital System Design: Architectures, Methods and Tools (DSD), 2010 13th Euromicro Conference on
, pp. 587-594
-
-
Bachmann, C.1
Genser, A.2
Steger, C.3
Weiss, R.4
Haid, J.5
|