{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:42:10Z","timestamp":1761324130350},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/iccad.2017.8203802","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T17:02:04Z","timestamp":1513270924000},"page":"376-383","source":"Crossref","is-referenced-by-count":21,"title":["Optimal checkpointing for secure intermittently-powered IoT devices"],"prefix":"10.1109","author":[{"given":"Zahra","family":"Ghodsi","sequence":"first","affiliation":[]},{"given":"Siddharth","family":"Garg","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.17.242"},{"key":"ref32","first-page":"311","article-title":"Markovian models for harvested energy in wireless communications","author":"keong ho","year":"2010","journal-title":"Communication Systems (ICCS) 2010 IEEE International Conference on"},{"journal-title":"Cadence RTL Compiler","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2185930"},{"key":"ref35","first-page":"132","article-title":"Cryptanalysis of 6-round prince using 2 known plaintexts","author":"rasoolzadeh","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"journal-title":"LegUp High-Level Synthesis","year":"0","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"ref11","first-page":"208","article-title":"Prince: a low-latency block cipher for pervasive computing applications","author":"borghoff","year":"2012","journal-title":"International Conference on the Theory and Application of Cryptology and Information Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NVMSA.2016.7547183"},{"key":"ref13","first-page":"15","article-title":"Hibernus: Sustaining computation during intermittent supply for energy-harvesting systems","author":"domenico","year":"2015","journal-title":"Embedded Systems Letters"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2014.63"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"journal-title":"Concurrency Control and Recovery in Database Systems","year":"1987","author":"philip","key":"ref16"},{"key":"ref17","article-title":"An overview of checkpointing in uniprocessor and distributedsystems","author":"plank","year":"1997","journal-title":"focusing on implementation and performance"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2004.1276566"},{"journal-title":"Transiently Powered Computers","year":"2013","author":"ransford","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF00993306"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.9"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1145\/2813885.2737978","article-title":"A simpler, safer programming and execution model for intermittent systems","author":"lucia","year":"2015","journal-title":"SIGPlan Notices"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1927","DOI":"10.1073\/pnas.1317233111","article-title":"Conformal piezoelectric energy harvesting and storage from motions of the heart, lung, and diaphragm","author":"dagdeviren","year":"2014","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056060"},{"year":"0","author":"moore","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2013.2262687"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000086"},{"key":"ref7","first-page":"65","article-title":"On a new way to read data from memory","author":"samyde","year":"2002","journal-title":"Security in Storage Workshop"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.062613.00235"},{"key":"ref9","article-title":"Securing non-volatile main memory","author":"enck","year":"2008","journal-title":"Technical Report"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747910"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1145\/2248487.1950386","article-title":"Mementos: system support for long-running computation on rfid-scale devices","author":"ransford","year":"2012","journal-title":"SIGPlan Notices"},{"key":"ref22","first-page":"1676","article-title":"A q-learning-based dynamic channel assignment technique for mobile communication systems","author":"nie","year":"1999","journal-title":"Transactions on Vehicular Technology"},{"key":"ref21","first-page":"4","article-title":"Hiq: a hierarchical q-learning algorithm to solve the reader collision problem","author":"ho","year":"2006","journal-title":"International Symposium on Applications and the Internet Workshops"},{"journal-title":"Gartner Says the Internet of Things Will Transform the Data Center","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687486"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744842"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2618128.2618136"}],"event":{"name":"2017 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)","start":{"date-parts":[[2017,11,13]]},"location":"Irvine, CA","end":{"date-parts":[[2017,11,16]]}},"container-title":["2017 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8167715\/8203744\/08203802.pdf?arnumber=8203802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T16:11:12Z","timestamp":1643127072000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8203802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/iccad.2017.8203802","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}