{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:04:13Z","timestamp":1769115853241,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000016","name":"U.S. Department of Health and Human Services","doi-asserted-by":"publisher","award":["90TR0003-01"],"award-info":[{"award-number":["90TR0003-01"]}],"id":[{"id":"10.13039\/100000016","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1314281, CNS-1314342"],"award-info":[{"award-number":["CNS-1314281, CNS-1314342"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2676431.2676432","type":"proceedings-article","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T19:32:56Z","timestamp":1414783976000},"page":"16-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Amulet"],"prefix":"10.1145","author":[{"given":"Andres","family":"Molina-Markham","sequence":"first","affiliation":[{"name":"Dartmouth College"}]},{"given":"Ronald","family":"Peterson","sequence":"additional","affiliation":[{"name":"Dartmouth College"}]},{"given":"Joseph","family":"Skinner","sequence":"additional","affiliation":[{"name":"Dartmouth College"}]},{"given":"Tianlong","family":"Yun","sequence":"additional","affiliation":[{"name":"Dartmouth College"}]},{"given":"Bhargav","family":"Golla","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Kevin","family":"Freeman","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Travis","family":"Peters","sequence":"additional","affiliation":[{"name":"Dartmouth College"}]},{"given":"Jacob","family":"Sorber","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Ryan","family":"Halter","sequence":"additional","affiliation":[{"name":"Dartmouth College"}]},{"given":"David","family":"Kotz","sequence":"additional","affiliation":[{"name":"Dartmouth College"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/788023.789068"},{"key":"e_1_3_2_1_2_1","volume-title":"Mar.","author":"Nother NTLR","year":"2014","unstructured":"A NTLR (A Nother Tool for Language Recognition). http:\/\/www.antlr.org\/ , Mar. 2014 . ANTLR (ANother Tool for Language Recognition). http:\/\/www.antlr.org\/, Mar. 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1835408.1835411"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009380.1009672"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/380171.380186"},{"key":"e_1_3_2_1_6_1","volume-title":"Cross correlation","author":"Bourke P.","year":"1996","unstructured":"P. Bourke . Cross correlation , 1996 . P. Bourke. Cross correlation, 1996."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373258"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2693"},{"key":"e_1_3_2_1_9_1","first-page":"75","volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI)","author":"Erlingsson U.","year":"2006","unstructured":"U. Erlingsson , M. Abadi , M. Vrable , M. Budiu , and G. C. Necula . XFI: software guards for system address spaces . In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI) , pages 75 -- 88 . USENIX, Nov. 2006 . U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: software guards for system address spaces. In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), pages 75--88. USENIX, Nov. 2006."},{"key":"e_1_3_2_1_10_1","unstructured":"T. Fisher. Interactive digital filter design 1999.  T. Fisher. Interactive digital filter design 1999."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.8"},{"key":"e_1_3_2_1_12_1","first-page":"201","volume-title":"Proceedings of the DARPA Information Survivability Conference and Exposition","volume":"1","author":"Li N.","year":"2003","unstructured":"N. Li and J. C. Mitchell . RT: A role-based trust-management framework . In Proceedings of the DARPA Information Survivability Conference and Exposition , volume 1 , pages 201 -- 212 . IEEE, 2003 . N. Li and J. C. Mitchell. RT: A role-based trust-management framework. In Proceedings of the DARPA Information Survivability Conference and Exposition, volume 1, pages 201--212. IEEE, 2003."},{"key":"e_1_3_2_1_13_1","volume-title":"Dec.","year":"2013","unstructured":"Motoactv. https:\/\/motoactv.com , Dec. 2013 . Motoactv. https:\/\/motoactv.com, Dec. 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516649"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1215684"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162092"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535505"},{"key":"e_1_3_2_1_18_1","volume-title":"Nov.","author":"Technology FRAM","year":"2013","unstructured":"FRAM Technology . http:\/\/www.ti.com\/lsds\/ti\/microcontroller\/16-bit_msp430\/fram\/overview.page , Nov. 2013 . FRAM Technology. http:\/\/www.ti.com\/lsds\/ti\/microcontroller\/16-bit_msp430\/fram\/overview.page, Nov. 2013."},{"key":"e_1_3_2_1_19_1","volume-title":"A library to find peaks in a 1d-list","year":"2013","unstructured":"xmhk. A library to find peaks in a 1d-list , 2013 . xmhk. A library to find peaks in a 1d-list, 2013."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038642.2038687"}],"event":{"name":"SenSys '14: The 12th ACM Conference on Embedded Network Sensor Systems","location":"Memphis Tennessee","acronym":"SenSys '14","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 1st Workshop on Mobile Medical Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676431.2676432","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2676431.2676432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:16Z","timestamp":1750227136000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676431.2676432"}},"subtitle":["a secure architecture for mHealth applications for low-power wearable devices"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":20,"alternative-id":["10.1145\/2676431.2676432","10.1145\/2676431"],"URL":"https:\/\/doi.org\/10.1145\/2676431.2676432","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}