Spelling suggestions: "subject:"2security hardware"" "subject:"bsecurity hardware""
1 |
Investigation of methods for secure transmission of digital data at high speedJohnston, B. A. January 1987 (has links)
No description available.
|
2 |
RESEARCH OF SECURITY HARDWARE IN PKI SYSTEMWenhua, Qi, Qishan, Zhang, Hailong, Liu 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / Security hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
|
3 |
Ring Oscillator Based Hardware Trojan DetectionHoque, Tamzidul January 2015 (has links)
No description available.
|
Page generated in 0.0465 seconds