Emerging hardware cryptography and VLSI implementation
暂无分享,去创建一个
[1] Mahadev Satyanarayanan. Roger Needham, 1935-2003 , 2003, IEEE Pervasive Comput..
[2] Y. Sato,et al. Design of a hardware security-embedded multimedia mobile processor , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..
[3] Jie Wu,et al. Guest Editors' Introduction: Ad Hoc Networks , 2004, Computer.
[4] Mahadev Satyanarayanan. Privacy: The Achilles Heel of Pervasive Computing? , 2003 .
[5] Öznur Özkasap,et al. Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.
[6] Tomoaki Sato,et al. A Stream Cipher Engine for Ad-Hoc Security , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).
[7] Tomoaki Sato,et al. Hardware/Software Co-design of a Secure Ubiquitous System , 2006, 2006 International Conference on Computational Intelligence and Security.
[8] Fei Xiang,et al. Dynamical Behavior of Three-Order Cellular Neural Network with Application in Image Secure Communication , 2007 .