From post

Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.

, , , , , и . ICICS, том 7618 из Lecture Notes in Computer Science, стр. 105-118. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices., , , , , и . ISC, том 8783 из Lecture Notes in Computer Science, стр. 555-567. Springer, (2014)Disk storage isolation and verification in cloud., , , и . GLOBECOM, стр. 771-776. IEEE, (2012)Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality., , и . GameSec, том 7638 из Lecture Notes in Computer Science, стр. 118-137. Springer, (2012)Using Purpose Capturing Signatures to Defeat Computer Virus Mutating., , , и . ISPEC, том 6047 из Lecture Notes in Computer Science, стр. 153-171. Springer, (2010)Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels., , , , и . ICICS, том 8233 из Lecture Notes in Computer Science, стр. 229-244. Springer, (2013)Vulnerable Service Invocation and Countermeasures., , , , , , и . IEEE Trans. Dependable Secur. Comput., 18 (4): 1733-1750 (2021)Verification of data redundancy in cloud storage., , , и . SCC@ASIACCS, стр. 11-18. ACM, (2013)Framework for Intrusion Tolerant Certification Authority System Evaluation., , и . SRDS, стр. 231-241. IEEE Computer Society, (2007)MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker., , , , , и . SERE, стр. 119-128. IEEE, (2013)A Scalable Anonymity Scheme Based on DHT Distributed Inquiry., , , и . TrustCom, стр. 1358-1363. IEEE Computer Society, (2012)