Piotr Ksiazak

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The number of Resource-Limited Wireless Devices utilized in many areas of IT is growing rapidly. Some of the applications of these devices pose real security threats that can be addressed using authentication and cryptography. Many of the available authentication and encryption software solutions are predicated on the availability of ample processing power(More)
  • 1