Subjects :
Hash Algorithm
논문 검색결과
| Type |
Year |
Title |
Cited |
Download |
|
Journal
|
2021 |
A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module
Kyeeun Kim Sensors, v.21, no.5, pp.1-11 |
2 |
원문
|
|
Journal
|
2018 |
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking
서석충 Security and Communication Networks, v.2018, pp.1-17 |
2 |
원문
|
|
Journal
|
2012 |
Efficient Scheme of Verifying Integrity of Application Binaries in Embedded Operating Systems
김순석 Journal of Supercomputing, v.59, no.2, pp.676-692 |
2 |
원문
|
|
Conference
|
2009 |
Hash Function with Variable Output Length
Ryu Jong Ho International Joint Conference on INC, IMS and IDC NCM (NCM) 2009, pp.600-605 |
1 |
원문
|
|
Conference
|
2008 |
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
Kim Moo Seop International Conference on Information Security and Cryptology (Inscrypt) 2008 (LNCS 5487), v.5487, pp.240-252 |
23 |
원문
|
연구보고서 검색결과
| Type |
Year |
Research Project |
Primary Investigator |
Download |
|
No search results. |