Implementation of an Energy Efficient Reconfigurable uthentication Unit for Software Radio
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
To promote the commercial implementation of software ownload for Software Defined Radio (SDR) terminals, a secure method of download is vital. Downloading of all the relevant software is performed via a public channel, and accordingly the security issue of the downloading is one of the key issues. For the purpose of security, it is necessary to ensure privacy, tegrity, and authentication. The paper aims at an efficient reconfigurable hardware architecture which supports data authentication for the secured downloading of software in reconfigurable receivers. A reconfigurable authentication unit which operates in two different modes of RSA and D.H is proposed. The algorithms are to be implemented using Verilog, and their hardware utilization on the FPGA device is to be analyzed.
Authors and Affiliations
L. Thulasimani , M. Madheswaran
Performance of machine learning methods for classification tasks
In this paper, the performance of various machine learning methods on pattern classification and recognition tasks are proposed. The proposed method for evaluating performance will be based on the feature representation,...
A Journey from floppy disk to cloud storage
Data storage and backup needs have evolved over the years necessitating the need for evolution of data storage methods and devices. The needs for a higher storage capacity as well as versatility of storage devices and th...
Principles of Video Segmentation Scenarios
Video segmentation is the first step toward automatic video processing such as browsing, retrieval, and indexing. Many algorithms and techniques have been proposed a few years ago. They can cover the topic of video segme...
Secure Association Rule Mining for Distributed Level Hierarchy in Web
Data mining technology can analyze massive data and it play very important role in many domains, if it used improperly it can also cause some new problem of information security. Thus several privacy preserving technique...
Data Warehouse Schema Evolution and Adaptation Framework Using Ontology
Data Warehouse systems aim at integrating data from multiple heterogeneous, distributed, autonomous data sources. Due to changing business needs the data warehouse systems are never meant to be static. Changes in the dat...