Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Derek Heeger"'
Publikováno v:
Sensors, Vol 21, Iss 7, p 2384 (2021)
Internet of Things (IoT) devices rely upon remote firmware updates to fix bugs, update embedded algorithms, and make security enhancements. Remote firmware updates are a significant burden to wireless IoT devices that operate using low-power wide-are
Externí odkaz:
https://doaj.org/article/371de992226f48db99b46c018157b01d
Publikováno v:
Cryptography, Vol 2, Iss 3, p 15 (2018)
Secure booting within a field-programmable gate array (FPGA) environment is traditionally implemented using hardwired embedded cryptographic primitives and non-volatile memory (NVM)-based keys, whereby an encrypted bitstream is decrypted as it is loa
Externí odkaz:
https://doaj.org/article/aaed4c449b674f1fa1703ea71a330c45
Publikováno v:
Sensors, Vol 21, Iss 2384, p 2384 (2021)
Sensors
Volume 21
Issue 7
Sensors (Basel, Switzerland)
Sensors
Volume 21
Issue 7
Sensors (Basel, Switzerland)
Internet of Things (IoT) devices rely upon remote firmware updates to fix bugs, update embedded algorithms, and make security enhancements. Remote firmware updates are a significant burden to wireless IoT devices that operate using low-power wide-are
Publikováno v:
GIoTS
Long Range (LoRa) is an emerging low-power wide-area network technology. LoRa messages can be transmitted with a variety of parameters including transmit power, spreading factor, bandwidth, and error coding rates. While adaptive data rate (ADR) capab
Autor:
Jim Plusquellic, Derek Heeger
Publikováno v:
DCOSS
Implementing a full set of security features within IoT devices is challenging because of constraints on the available resources and power consumption. Nevertheless, such devices must be capable of carrying out mutual authentication with gateways and
Publikováno v:
Ad-Hoc, Mobile, and Wireless Networks ISBN: 9783030617455
ADHOC-NOW
ADHOC-NOW
LoRa (Long Range) is a low-power wide-area network technology well-suited for Internet of Things (IoT) applications. In this paper, LoRa is used in a cattle monitoring application where an ad-hoc mesh network is configured to collect GPS and accelero
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f6b07178222638438621912bc12ebe44
https://doi.org/10.1007/978-3-030-61746-2_17
https://doi.org/10.1007/978-3-030-61746-2_17
Publikováno v:
IEEE Transactions on Power Electronics. 32:8071-8088
Current data center power delivery architectures consist of many cascaded power conversion stages, where the system-level power conversion efficiency is reduced each time the power is processed through the individual stages. Recently, series-stacked
Autor:
Jim Plusquellic, Donald Edward Owen, Fareena Saqib, Derek Heeger, Matthew Areno, Wenjie Che, Calvin Chan
Publikováno v:
Cryptography
Volume 2
Issue 3
Cryptography, Vol 2, Iss 3, p 15 (2018)
Volume 2
Issue 3
Cryptography, Vol 2, Iss 3, p 15 (2018)
Secure booting within a field-programmable gate array (FPGA) environment is traditionally implemented using hardwired embedded cryptographic primitives and non-volatile memory (NVM)-based keys, whereby an encrypted bitstream is decrypted as it is loa