Design of Cryptographic Hardware Architecture for Mobile Computing
Mooseop Kim, Youngsae Kim, Hyunsook Cho, Journal of Information Processing Systems Vol. 5, No. 4, pp. 187-196, Dec. 2009
https://doi.org/10.3745/JIPS.2009.5.4.187
Keywords: Trusted Computing, MTM, Cryptographic circuit, RSA, HASH, Mobile Computing
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Kim, M., Kim, Y., & Cho, H. (2009). Design of Cryptographic Hardware Architecture for Mobile Computing. Journal of Information Processing Systems, 5(4), 187-196. DOI: 10.3745/JIPS.2009.5.4.187.
[IEEE Style]
M. Kim, Y. Kim, H. Cho, "Design of Cryptographic Hardware Architecture for Mobile Computing," Journal of Information Processing Systems, vol. 5, no. 4, pp. 187-196, 2009. DOI: 10.3745/JIPS.2009.5.4.187.
[ACM Style]
Mooseop Kim, Youngsae Kim, and Hyunsook Cho. 2009. Design of Cryptographic Hardware Architecture for Mobile Computing. Journal of Information Processing Systems, 5, 4, (2009), 187-196. DOI: 10.3745/JIPS.2009.5.4.187.