搜索结果: 1-2 共查到“军事学 Tree Parity Machine Rekeying Architectures”相关记录2条 . 查询时间(0.078 秒)
Tree Parity Machine Rekeying Architectures
K.4.4.f Security K.6.5.a Authentication B.7.1.b Algorithms implemented in hardware
2009/3/27
The necessity to secure the communication between hardware components in embedded systems
becomes increasingly important with regard to the secrecy of data and particularly its commercial use.
We su...
Tree Parity Machine Rekeying Architectures for Embedded Security
Tree Parity Machine Rekeying Architectures Embedded Security pervasive computing
2009/2/19
Tree Parity Machine Rekeying Architectures for Embedded Security.