Login / Signup
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.
Mooseop Kim
Youngse Kim
Jaecheol Ryou
Sungik Jun
Published in:
ATC (2007)
Keyphrases
</>
efficient implementation
active set
hardware implementation
linear programming
software engineering
nonnegative matrix factorization
block matching motion estimation