Low-power techniques for network security processors | IEEE Conference Publication | IEEE Xplore