Blockchain technology entered the enterprise domain under the name of permissioned blockchains and hybrid or verifiable database systems, as they provide a distributed solution …
In mobile edge computing (MEC), mobile devices limited to computation and memory resources offload compute-intensive tasks to nearby edge servers. User movement causes …
The ultimate goal of modern cryptography is to protect the information resource and make it absolutely unbreakable and beyond compromise. However, throughout the history of …
The modern age has seen an enormous progress in communications. Millions of devices communicate over the web transmitting confidential information which sometimes is of …
In the present day, billions of devices communicate over the wireless networks. The massive information transmitted over open ended, and unsecured Internet architecture results in …
L Malina, D Smekal, S Ricci, J Hajny, P Cíbik… - International Conference …, 2020 - Springer
The paper presents a hardware-accelerated cryptographic solution for Field Programmable Gate Array (FPGA) based network cards that provide throughput up to 200 Gpbs. Our …
This case report presents a real example of a study which introduces the use of reconfigurable platforms in the teaching of electronics engineering to establish a bridge …
Reconfigurable devices (RDs) are extremely advantageous when employed in real-time embedded systems. Nonetheless, they are susceptible to soft errors. In a broad sense, the …