1. Power consumption of the Raspberry Pi: A comparative analysis
2. Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
3. William J Caelli , Edward P Dawson , and Scott A Rea . 1999. PKI , elliptic curve cryptography, and digital signatures. omputers & Security , Vol. 18 , 1 ( 1999 ), 47--66. William J Caelli, Edward P Dawson, and Scott A Rea. 1999. PKI, elliptic curve cryptography, and digital signatures. omputers & Security, Vol. 18, 1 (1999), 47--66.
4. Sang-Yoon Chang , Sristi Lakshmi Sravana Kumar , and Yih-Chun Hu . 2017 a. Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 2302--2307 . https://doi.org/10.1109/ICDCS.2017.260 Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, and Yih-Chun Hu. 2017a. Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 2302--2307. https://doi.org/10.1109/ICDCS.2017.260
5. Power-positive networking using wireless charging