Author of the publication

Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.

, , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 410-419. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Service-oriented DDoS detection mechanism using pseudo state in a flow router., , , , , , and . Multimedia Tools Appl., 74 (16): 6341-6363 (2015)Optical Computing for Digital Signal Process in Incoherent Fiber System Using Positive Realization., , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 95-102. Springer, (2014)A Design and Implementation of Profile Based Web Application Securing Proxy., , , and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 248-259. Springer, (2006)DDoS Detection Algorithm Using the Bidirectional Session., , , and . CN, volume 160 of Communications in Computer and Information Science, page 191-203. Springer, (2011)Intelligent Application Protection Mechanism for Transportation in V2C Environment., , , and . IEEE Access, (2020)Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 240-252. Springer, (2008)Low Power AES Hardware Architecture for Radio Frequency Identification., , , and . IWSEC, volume 4266 of Lecture Notes in Computer Science, page 353-363. Springer, (2006)Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module., , and . WISA, volume 5379 of Lecture Notes in Computer Science, page 292-304. Springer, (2008)User-Centric Key Management Scheme for Personal Cloud Storage., , , , , and . ICISA, page 1-4. IEEE, (2013)An Integrated XML Security Mechanism for Mobile Grid Application., , , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 776-783. Springer, (2004)