References
- Thomas Wollinger, Jorge Guajardo and Christof Paar, "Cryptography in Embedded Systems: An Overview," Proceedings of the Embedded World Exhibition and Conference (Feb. 2003), pp. 735-744.
- Wei Jiang, Zhenlin Guo, Yue Ma and Nan Sang, "Research on Cryptographic Algorithms for Embedded Real-time Systems: A Perspective of Measurement-Based Analysis," IEEE 14th International Conference on High Performance Computing and Communications (Jun. 2012), pp. 1495-1501.
- Meikang Qiu, Wenzhong Gao, Min Chen, Jian-Wei Niu and Lei Zhang, "Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System," IEEE Transactions on Smart Grid (Dec. 2011), vol. 2, no. 4, pp. 715-723. DOI: http://10.1109/TSG.2011.2160298
- Wan Yeon Lee, "Energy-efficient Scheduling of Periodic Real-time Tasks on Lightly Loaded Multicore Processors," IEEE Transactions on Parallel and Distributed Systems (Mar. 2012), vol. 23, no. 3, pp. 530-537. DOI: http://10.1109/TPDS.2011.87
- Eduardo Cuervo, Aruna Balasubramanian and Dae-ki Cho, "MAUI: Making Smartphones Last Longer with Code Offload," Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (Jun. 2010), pp. 49-62.
- G. Wang, W. Li and X. Hei, "Energy-Aware Real-time Scheduling on Heterogeneous Multi-Processor," Annual Conference on Information Sciences and Systems (Mar. 2015), pp. 1-7.
- R. Smith, C. Estan and S. Jha, "Backtracking Algorithmic Complexity Attack against a NIDS," The 22nd Annual Computer Security Applications Conference (Dec. 2006), pp. 89-98.
- S. Khan and I. Traore, "A Prevention Model for Algorithmic Complexity Attacks," The 2nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (July 2005), pp. 160-173.
- Qiang Huang, Hisashi Kobayashi, Bede Liu, Daqing Gu and Jinyun Zhang, "Energy/Security Scalable Mobile Cryptosystem," TR-2003-79, MERL - A Mitsubishi Electrical Research Laboratory (Feb. 2004), http://www.merl.com.
- Wan Yeon Lee, Yun-Seok Choi, "Optimization of ARIA Block-Cipher Algorithm on Embedded Systems with 16-bits Processors," International Journal of Internet, Broadcasting and Communication, vol. 8, no. 1, pp. 88-98, Feb. 2016. DOI: http://dx.doi.org/10.7236/IJIBC.2016.8.1.42