Benchmarking and Configuring Security Levels in Intermittent Computing. Krishnan, A. S. & Schaumont, P. ACM Trans. Embed. Comput. Syst., 21(4):36:1–36:22, 2022.
Paper doi bibtex @article{DBLP:journals/tecs/KrishnanS22,
author = {Archanaa S. Krishnan and
Patrick Schaumont},
title = {Benchmarking and Configuring Security Levels in Intermittent Computing},
journal = {{ACM} Trans. Embed. Comput. Syst.},
volume = {21},
number = {4},
pages = {36:1--36:22},
year = {2022},
url = {https://doi.org/10.1145/3522748},
doi = {10.1145/3522748},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tecs/KrishnanS22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"mQKiQDcFaMRs77DvG","bibbaseid":"krishnan-schaumont-benchmarkingandconfiguringsecuritylevelsinintermittentcomputing-2022","author_short":["Krishnan, A. S.","Schaumont, P."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Archanaa","S."],"propositions":[],"lastnames":["Krishnan"],"suffixes":[]},{"firstnames":["Patrick"],"propositions":[],"lastnames":["Schaumont"],"suffixes":[]}],"title":"Benchmarking and Configuring Security Levels in Intermittent Computing","journal":"ACM Trans. Embed. Comput. Syst.","volume":"21","number":"4","pages":"36:1–36:22","year":"2022","url":"https://doi.org/10.1145/3522748","doi":"10.1145/3522748","timestamp":"Mon, 26 Jun 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/tecs/KrishnanS22.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/tecs/KrishnanS22,\n author = {Archanaa S. Krishnan and\n Patrick Schaumont},\n title = {Benchmarking and Configuring Security Levels in Intermittent Computing},\n journal = {{ACM} Trans. Embed. Comput. Syst.},\n volume = {21},\n number = {4},\n pages = {36:1--36:22},\n year = {2022},\n url = {https://doi.org/10.1145/3522748},\n doi = {10.1145/3522748},\n timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/tecs/KrishnanS22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Krishnan, A. S.","Schaumont, P."],"key":"DBLP:journals/tecs/KrishnanS22","id":"DBLP:journals/tecs/KrishnanS22","bibbaseid":"krishnan-schaumont-benchmarkingandconfiguringsecuritylevelsinintermittentcomputing-2022","role":"author","urls":{"Paper":"https://doi.org/10.1145/3522748"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/39/1269.bib","dataSources":["kxovqZ2fkPN6C2xTx","yggQsBJRFfDhjPEum"],"keywords":[],"search_terms":["benchmarking","configuring","security","levels","intermittent","computing","krishnan","schaumont"],"title":"Benchmarking and Configuring Security Levels in Intermittent Computing","year":2022}