tight real-time constraints / scant and fleeting energy / energy intensive / random device / energy limitations / energy availability scenarios / higher-powered wireless / brute-force search / energy-saving remote storage system / reader infrastructure / programmable devices / communication protocol / abundant energy / energy use / subsequent energy lifecycle / energy supply / possible applications / pose energy challenges / radio protocol / energy savings / per-checkpoint energy consumption / untrustworthy infrastructure / energy / wasted energy / prototype device / energy consumption / energy-intensive erasures / carrier signal / harvested energy / communication hardware / energy requirements / secure remote storage protocol / minimal energy / energy harvesting circuitry / sufficient energy / less energy / standalone devices / energy harvesting / insufficient energy / energy lifecycles / magnitude more energy / secure and energy-efficient manner / harvestable energy / low-energy computing systems / energy constraints / constant energy shortfalls / nonstandard reader hardware / symmetrickey challenge-response protocols / energy advantage / energy availability / particular energy delivery schedule / excess energy / energy storage / energy lifecycle / less energy-intensive radio communication / energy cost / energy measurements / external infrastructure / untrusted reader infrastructure / appropriate carrier signal / radio communications / steady energy supply / energy-hungry resource / Wireless Identification / /
OperatingSystem
Linux / DoS / /
Organization
Security Division of EMC / University of Massachusetts Amherst / Computational Continuation Passing / EPC / Department of Computer Science / CCCP’s MAC / /