Inproceedings,

Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.

, , , and .
ATC, volume 4610 of Lecture Notes in Computer Science, page 410-419. Springer, (2007)

Meta data

Tags

Users

  • @dblp

Comments and Reviews