메뉴 건너뛰기




Volumn 2, Issue 1, 2003, Pages 21-29

Hardware implementation of bluetooth security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER SOFTWARE; CRYPTOGRAPHY; DATA PRIVACY; MOBILE COMPUTING; NETWORK PROTOCOLS; PUBLIC POLICY; RANDOM ACCESS STORAGE;

EID: 3042720550     PISSN: 15361268     EISSN: None     Source Type: Journal    
DOI: 10.1109/MPRV.2003.1186722     Document Type: Article
Times cited : (28)

References (10)
  • 2
    • 0036287554 scopus 로고    scopus 로고
    • Random number generator architecture and VLSI implementation
    • IEEE Circuits and Systems Soc. Press, Piscataway, N.J
    • N. Sklavos et al., "Random Number Generator Architecture and VLSI Implementation," Proc. IEEE Int'l Symp. Circuits & Systems (ISCAS 02), IEEE Circuits and Systems Soc. Press, Piscataway, N.J., 2002, pp. 854-857.
    • (2002) Proc. IEEE Int'l Symp. Circuits & Systems (ISCAS 02) , pp. 854-857
    • Sklavos, N.1
  • 4
    • 84952950704 scopus 로고
    • Linear ciphers and random sequence generators with multiple clocks
    • Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • J.L. Massey and R. Rueppel, "Linear Ciphers and Random Sequence Generators with Multiple Clocks," Advances in Cryptology: Proc. Eurocrypt 84, Lecture Notes in Computer Science, vol. 209, Springer-Verlag, Berlin, 1984, pp. 74-87.
    • (1984) Advances in Cryptology: Proc. Eurocrypt 84 , vol.209 , pp. 74-87
    • Massey, J.L.1    Rueppel, R.2
  • 5
    • 0042697549 scopus 로고    scopus 로고
    • Disappearing hardware
    • Jan.-Mar.
    • R. Want et al., "Disappearing Hardware," IEEE Pervasive Computing, vol. 1, no. 1, Jan.-Mar. 2002, pp. 36-47.
    • (2002) IEEE Pervasive Computing , vol.1 , Issue.1 , pp. 36-47
    • Want, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.