Reviews
Description
In order to comply with the requirements on the confidential communications and the information securities for handheld devices in the market, it is necessary for us to introduce the information crypto technology to the embedded devices. The challenge we have to face is to operate the system smoothly under the constraints of low cost, low power consumption, and high efficiency while transmitting the cryptosystem technique into the embedded system platform in mobile devices. In this thesis, we will combine a virtual microprocessor of the verification and AMBA bus to elaborate an embedded system model that is capable of shortening the testing time of the global system and calculating the performance for various types of microprocessors. An AES hardware of power management technology and Chaos key evolved module would be integrated to create an embedded cryptosystem. The results of our experiments would offer a valuable reference for the future planning and evaluation for the consuming electronic product based public and information security system.
EXTRA 10 % discount with code: EXTRA
The promotion ends in 19d.13:41:53
The discount code is valid when purchasing from 10 €. Discounts do not stack.
In order to comply with the requirements on the confidential communications and the information securities for handheld devices in the market, it is necessary for us to introduce the information crypto technology to the embedded devices. The challenge we have to face is to operate the system smoothly under the constraints of low cost, low power consumption, and high efficiency while transmitting the cryptosystem technique into the embedded system platform in mobile devices. In this thesis, we will combine a virtual microprocessor of the verification and AMBA bus to elaborate an embedded system model that is capable of shortening the testing time of the global system and calculating the performance for various types of microprocessors. An AES hardware of power management technology and Chaos key evolved module would be integrated to create an embedded cryptosystem. The results of our experiments would offer a valuable reference for the future planning and evaluation for the consuming electronic product based public and information security system.
Reviews