From post

Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing.

, , и . Inscrypt, том 5487 из Lecture Notes in Computer Science, стр. 240-252. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optical Computing for Digital Signal Process in Incoherent Fiber System Using Positive Realization., , и . FCC, том 301 из Lecture Notes in Electrical Engineering, стр. 95-102. Springer, (2014)A Design and Implementation of Profile Based Web Application Securing Proxy., , , и . ISPEC, том 3903 из Lecture Notes in Computer Science, стр. 248-259. Springer, (2006)DDoS Detection Algorithm Using the Bidirectional Session., , , и . CN, том 160 из Communications in Computer and Information Science, стр. 191-203. Springer, (2011)A Service-oriented DDoS detection mechanism using pseudo state in a flow router., , , , , , и . Multimedia Tools Appl., 74 (16): 6341-6363 (2015)Intelligent Application Protection Mechanism for Transportation in V2C Environment., , , и . IEEE Access, (2020)Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing., , и . Inscrypt, том 5487 из Lecture Notes in Computer Science, стр. 240-252. Springer, (2008)Low Power AES Hardware Architecture for Radio Frequency Identification., , , и . IWSEC, том 4266 из Lecture Notes in Computer Science, стр. 353-363. Springer, (2006)Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module., , и . WISA, том 5379 из Lecture Notes in Computer Science, стр. 292-304. Springer, (2008)An Integrated XML Security Mechanism for Mobile Grid Application., , , , и . ICCSA (1), том 3043 из Lecture Notes in Computer Science, стр. 776-783. Springer, (2004)User-Centric Key Management Scheme for Personal Cloud Storage., , , , , и . ICISA, стр. 1-4. IEEE, (2013)