Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing.
Mooseop KimDeok-Gyu LeeJaecheol RyouPublished in: Pers. Ubiquitous Comput. (2013)
Keyphrases
- mobile computing
- hardware architecture
- mobile devices
- wireless networks
- context aware
- mobile users
- mobile environments
- transaction processing
- hardware implementation
- ubiquitous computing
- data management
- wireless communication
- location dependent
- hardware architectures
- mobile agents
- distributed systems
- transaction model
- data collection
- field programmable gate array
- computing environments
- mobile computing environment
- mobile technologies
- mobile learning
- computer simulation
- intelligent systems
- mobile phone
- multi agent
- databases