There was an error while loading. Please reload this page.
Abstract: With the rocketing progress of the fifth generation (5G) mobile communication technology, identity-based authenticated key agreement (ID-AKA) protocol performs an increasingly significant ...
Abstract: This work compares trade-offs to implement Authenticated Encryption with Associated Data (AEAD) in resource-constrained RISC-V-based embedded systems, both with and without hardware ...
Open config.php and update the database configuration details. There was an error while loading. Please reload this page.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results