Sciweavers

6781 search results - page 53 / 1357
» Processors for Mobile Applications
Sort
View
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
13 years 9 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
CSREASAM
2006
13 years 9 months ago
Securing Collaborative Applications
Mobile technologies are experiencing rapid growth and adoption in both enterprise and consumer markets, as users demand unfettered access to resources, services, and data at any ti...
Manoj B. Sastry, Michael J. Covington, Deepak J. M...
QEST
2006
IEEE
14 years 1 months ago
Measuring and Modeling of Application Flow Length in Commercial GPRS Networks
New mobile access networks provide reasonable high bandwidth to allow true internet access. This paper models two dominant applications of those networks. One application, WAP, is...
Roger Kalden, Boudewijn R. Haverkort
CSI
2004
353views more  CSI 2004»
13 years 7 months ago
Design and implementation of a mobile database for Java phones
Due to the popularity of electronic commerce and the maturity of wireless technology, mobile users can access the Internet anytime anywhere without having to physically hook up an...
Eric Jui-Lin Lu, Yung-Yuan Cheng