Login / Signup
An Encryption-Enabled Network Protocol Accelerator.
Steffen Peter
Mario Zessack
Frank Vater
Goran Panic
Horst Frankenfeldt
Michael Methfessel
Published in:
WWIC (2008)
Keyphrases
</>
encryption algorithms
parallel implementation
data sets
real world
image encryption
databases
encryption scheme
data protection
key exchange
real time
image processing
security analysis
high security
compute intensive
encryption decryption