A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments
JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …
for various areas of applications. These algorithms are the backbone of data protection and …
Survey and systematization of secure device pairing
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …
communications among smart devices, both personal mobile devices and Internet of Things …
A simpler, safer programming and execution model for intermittent systems
Energy harvesting enables novel devices and applications without batteries, but intermittent
operation under energy harvesting poses new challenges to memory consistency that …
operation under energy harvesting poses new challenges to memory consistency that …
Sok: Security and privacy in implantable medical devices and body area networks
Balancing security, privacy, safety, and utility is a necessity in the health care domain, in
which implantable medical devices (IMDs) and body area networks (BANs) have made it …
which implantable medical devices (IMDs) and body area networks (BANs) have made it …
Bringing gesture recognition to all devices
Existing gesture-recognition systems consume significant power and computational
resources that limit how they may be used in low-end devices. We introduce AllSee, the first …
resources that limit how they may be used in low-end devices. We introduce AllSee, the first …
Recognizing daily activities with RFID-based sensors
We explore a dense sensing approach that uses RFID sensor network technology to
recognize human activities. In our setting, everyday objects are instrumented with UHF RFID …
recognize human activities. In our setting, everyday objects are instrumented with UHF RFID …
Experimental results with two wireless power transfer systems
This paper describes two wireless power transfer systems. The Wireless Identification and
Sensing Platform (WISP) is a platform for sensing and computation that is powered and read …
Sensing Platform (WISP) is a platform for sensing and computation that is powered and read …
[PDF][PDF] Dewdrop: An {Energy-Aware} Runtime for Computational {RFID}
Computational RFID (CRFID) tags embed sensing and computation into the physical world.
The operation of the tags is limited by the RF energy that can be harvested from a nearby …
The operation of the tags is limited by the RF energy that can be harvested from a nearby …
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a
verifier (terminal) without any user interaction. Currently deployed ZIA solutions are …
verifier (terminal) without any user interaction. Currently deployed ZIA solutions are …
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
In this paper, we report on a new approach for enhancing security and privacy in certain
RFID applications whereby location or location-related information (such as speed) can …
RFID applications whereby location or location-related information (such as speed) can …