2006 ITI 4th International Conference on Information &Amp; Communications Technology 2006
DOI: 10.1109/itict.2006.358283
|View full text |Cite
|
Sign up to set email alerts
|

Design Space Exploration of a Reconfigurable HMAC-Hash Unit

Abstract: In this paper, a design space exploration of a reconfigurable HMAC-hash unit is discussed. This

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…The authorization process is done using a hello protocol. HELLO beacon messages per interval time in order to periodically update link information [15]. To follow hello beacon, the protocol would affect the network performances.…”
Section: Infrastructure-less Communicationmentioning
confidence: 99%
See 1 more Smart Citation
“…The authorization process is done using a hello protocol. HELLO beacon messages per interval time in order to periodically update link information [15]. To follow hello beacon, the protocol would affect the network performances.…”
Section: Infrastructure-less Communicationmentioning
confidence: 99%
“…Thus, to authorize users in infrastructure-less devices, a key provided by the programmer is sent by device A; if device B as the receiver returns the right string then device B is authorized. www.ijacsa.thesai.org One of the solutions for security in peer-to-peer is provided by the Android API 3 is known as Elliptic Curve Diffie-Hellman [16] that sends a key without sharing the actual key. In this approach, the message is encrypted and decrypted.…”
Section: Infrastructure-less Communicationmentioning
confidence: 99%